data
dict
{ "issue": { "id": "1Jv6pC6iiPe", "title": "Feb.", "year": "2023", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xC6REtgYiA", "doi": "10.1109/TVCG.2021.3119212", "abstract": "Spreadsheet-based tools provide a simple yet effective way of calculating values, which makes them the number-one choice for building and formalizing simple models for budget planning and many other applications. A cell in a spreadsheet holds one specific value and gives a discrete, overprecise view of the underlying model. Therefore, spreadsheets are of limited use when investigating the inherent uncertainties of such models and answering what-if questions. Existing extensions typically require a complex modeling process that cannot easily be embedded in a tabular layout. In Fuzzy Spreadsheet, a cell can hold and display a distribution of values. This integrated uncertainty-handling immediately conveys sensitivity and robustness information. The fuzzification of the cells enables calculations not only with precise values but also with distributions, and probabilities. We conservatively added and carefully crafted visuals to maintain the look and feel of a traditional spreadsheet while facilitating <italic>what-if analyses</italic>. Given a user-specified reference cell, Fuzzy Spreadsheet automatically extracts and visualizes contextually relevant information, such as impact, uncertainty, and degree of neighborhood, for the selected and related cells. To evaluate its usability and the perceived mental effort required, we conducted a user study. The results show that our approach outperforms traditional spreadsheets in terms of answer correctness, response time, and perceived mental effort in almost all tasks tested.", "abstracts": [ { "abstractType": "Regular", "content": "Spreadsheet-based tools provide a simple yet effective way of calculating values, which makes them the number-one choice for building and formalizing simple models for budget planning and many other applications. A cell in a spreadsheet holds one specific value and gives a discrete, overprecise view of the underlying model. Therefore, spreadsheets are of limited use when investigating the inherent uncertainties of such models and answering what-if questions. Existing extensions typically require a complex modeling process that cannot easily be embedded in a tabular layout. In Fuzzy Spreadsheet, a cell can hold and display a distribution of values. This integrated uncertainty-handling immediately conveys sensitivity and robustness information. The fuzzification of the cells enables calculations not only with precise values but also with distributions, and probabilities. We conservatively added and carefully crafted visuals to maintain the look and feel of a traditional spreadsheet while facilitating <italic>what-if analyses</italic>. Given a user-specified reference cell, Fuzzy Spreadsheet automatically extracts and visualizes contextually relevant information, such as impact, uncertainty, and degree of neighborhood, for the selected and related cells. To evaluate its usability and the perceived mental effort required, we conducted a user study. The results show that our approach outperforms traditional spreadsheets in terms of answer correctness, response time, and perceived mental effort in almost all tasks tested.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Spreadsheet-based tools provide a simple yet effective way of calculating values, which makes them the number-one choice for building and formalizing simple models for budget planning and many other applications. A cell in a spreadsheet holds one specific value and gives a discrete, overprecise view of the underlying model. Therefore, spreadsheets are of limited use when investigating the inherent uncertainties of such models and answering what-if questions. Existing extensions typically require a complex modeling process that cannot easily be embedded in a tabular layout. In Fuzzy Spreadsheet, a cell can hold and display a distribution of values. This integrated uncertainty-handling immediately conveys sensitivity and robustness information. The fuzzification of the cells enables calculations not only with precise values but also with distributions, and probabilities. We conservatively added and carefully crafted visuals to maintain the look and feel of a traditional spreadsheet while facilitating what-if analyses. Given a user-specified reference cell, Fuzzy Spreadsheet automatically extracts and visualizes contextually relevant information, such as impact, uncertainty, and degree of neighborhood, for the selected and related cells. To evaluate its usability and the perceived mental effort required, we conducted a user study. The results show that our approach outperforms traditional spreadsheets in terms of answer correctness, response time, and perceived mental effort in almost all tasks tested.", "title": "Fuzzy Spreadsheet: Understanding and Exploring Uncertainties in Tabular Calculations", "normalizedTitle": "Fuzzy Spreadsheet: Understanding and Exploring Uncertainties in Tabular Calculations", "fno": "09566799", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualisation", "Fuzzy Set Theory", "Probability", "Spreadsheet Programs", "Complex Modeling Process", "Fuzzy Spreadsheet", "Integrated Uncertainty Handling", "Spreadsheet Based Tools", "Tabular Calculations", "Tabular Layout", "User Specified Reference Cell", "Uncertainty", "Costs", "Automobiles", "Tools", "Visualization", "Computational Modeling", "Maintenance Engineering", "Uncertainty Visualization", "Tabular Data", "Spreadsheet Augmentation" ], "authors": [ { "givenName": "Vaishali", "surname": "Dhanoa", "fullName": "Vaishali Dhanoa", "affiliation": "Pro2Future GmbH, Linz, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Conny", "surname": "Walchshofer", "fullName": "Conny Walchshofer", "affiliation": "Johannes Kepler University Linz, Linz, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Andreas", "surname": "Hinterreiter", "fullName": "Andreas Hinterreiter", "affiliation": "Johannes Kepler University Linz, Linz, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Eduard", "surname": "Gröller", "fullName": "Eduard Gröller", "affiliation": "TU Wien, Vienna, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Marc", "surname": "Streit", "fullName": "Marc Streit", "affiliation": "Johannes Kepler University Linz, Linz, Austria", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2023-02-01 00:00:00", "pubType": "trans", "pages": "1463-1477", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vissoft/2014/6150/0/6150a011", "title": "Integrating Anomaly Diagnosis Techniques into Spreadsheet Environments", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2014/6150a011/12OmNBInLjl", "parentPublication": { "id": "proceedings/vissoft/2014/6150/0", "title": "2014 Second IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-c/2017/1589/0/1589a356", "title": "Towards systematic spreadsheet construction processes", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2017/1589a356/12OmNBKW9B8", "parentPublication": { "id": "proceedings/icse-c/2017/1589/0", "title": "2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2012/2313/0/06405299", "title": "Refactoring meets spreadsheet formulas", "doi": null, "abstractUrl": "/proceedings-article/icsm/2012/06405299/12OmNBkxsxl", "parentPublication": { "id": "proceedings/icsm/2012/2313/0", "title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2012/2313/0/06405300", "title": "Detecting code smells in spreadsheet formulas", "doi": null, "abstractUrl": "/proceedings-article/icsm/2012/06405300/12OmNrH1PEf", "parentPublication": { "id": "proceedings/icsm/2012/2313/0", "title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883040", "title": "Visualizing the problem domain for spreadsheet users: A mental model perspective", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883040/12OmNx1Iw8e", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2017/0992/0/0992a670", "title": "Understanding Spreadsheet Evolution in Practice", "doi": null, "abstractUrl": "/proceedings-article/icsme/2017/0992a670/12OmNx2QUH1", "parentPublication": { "id": "proceedings/icsme/2017/0992/0", "title": "2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2013/2552/0/06688892", "title": "Mutation-based spreadsheet debugging", "doi": null, "abstractUrl": "/proceedings-article/issrew/2013/06688892/12OmNxTVTYC", "parentPublication": { "id": "proceedings/issrew/2013/2552/0", "title": "2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645237", "title": "An empirical study of spreadsheet authors' mental models in explaining and debugging tasks", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645237/12OmNyoAAat", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iceccs/2020/8558/0/855800a171", "title": "The Semantic Spreadsheet", "doi": null, "abstractUrl": "/proceedings-article/iceccs/2020/855800a171/1s659gSdjB6", "parentPublication": { "id": "proceedings/iceccs/2020/8558/0", "title": "2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apr/2021/4472/0/447200a021", "title": "Domain invariant-based spreadsheet debugging", "doi": null, "abstractUrl": "/proceedings-article/apr/2021/447200a021/1vb99iv4yty", "parentPublication": { "id": "proceedings/apr/2021/4472/0", "title": "2021 IEEE/ACM International Workshop on Automated Program Repair (APR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09557800", "articleId": "1xquQN6emfS", "__typename": "AdjacentArticleType" }, "next": { "fno": "09576632", "articleId": "1xIKunVGow0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBpEeNd", "title": "August", "year": "1975", "issueNum": "08", "idPrefix": "tc", "pubType": "journal", "volume": "24", "label": "August", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwhHcI0", "doi": "10.1109/T-C.1975.224321", "abstract": "It is shown that arithmetic operations are simplified if complex numbers are represented in an integrated form with real and imaginary parts sharing the same exponent. In the new representation, numbers with large magnitudes suffer increased rounding errors but errors for some other numbers decrease.", "abstracts": [ { "abstractType": "Regular", "content": "It is shown that arithmetic operations are simplified if complex numbers are represented in an integrated form with real and imaginary parts sharing the same exponent. In the new representation, numbers with large magnitudes suffer increased rounding errors but errors for some other numbers decrease.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "It is shown that arithmetic operations are simplified if complex numbers are represented in an integrated form with real and imaginary parts sharing the same exponent. In the new representation, numbers with large magnitudes suffer increased rounding errors but errors for some other numbers decrease.", "title": "On the Floating Point Representation of Complex Numbers", "normalizedTitle": "On the Floating Point Representation of Complex Numbers", "fno": "01672914", "hasPdf": true, "idPrefix": "tc", "keywords": [ "Complex Numbers", "Floating Point", "Imaginary Base", "Negative Base", "Number Representation", "Rounding Errors" ], "authors": [ { "givenName": "C.K.", "surname": "Yuen", "fullName": "C.K. Yuen", "affiliation": "Computer Center, Australian National University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "08", "pubDate": "1975-08-01 00:00:00", "pubType": "trans", "pages": "846-848", "year": "1975", "issn": "0018-9340", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccd/1998/9099/0/90990142", "title": "How Many Logic Levels Does Floating-Point Addition Require?", "doi": null, "abstractUrl": "/proceedings-article/iccd/1998/90990142/12OmNBghtw0", "parentPublication": { "id": "proceedings/iccd/1998/9099/0", "title": "Proceedings International Conference on Computer Design. VLSI in Computers and Processors (Cat. No.98CB36273)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iitsi/2009/3579/0/3579a092", "title": "Pipeline Design of Transformation between Floating Point Numbers Based on IEEE754 Standard and 32-bit Integer Numbers", "doi": null, "abstractUrl": "/proceedings-article/iitsi/2009/3579a092/12OmNBhHtfY", "parentPublication": { "id": "proceedings/iitsi/2009/3579/0", "title": "Intelligent Information Technology and Security Informatics, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1977/07/01674894", "title": "Floating-Point Computation of Functions with Maximum Accuracy", "doi": null, "abstractUrl": "/journal/tc/1977/07/01674894/13rRUx0xPlD", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1990/08/t1025", "title": "Square Rooting Algorithms for Integer and Floating-Point Numbers", "doi": null, "abstractUrl": "/journal/tc/1990/08/t1025/13rRUx0xPuA", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2004/02/t0097", "title": "Delay-Optimized Implementation of IEEE Floating-Point Addition", "doi": null, "abstractUrl": "/journal/tc/2004/02/t0097/13rRUxASuuw", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1970/08/01671610", "title": "A Formalization of Floating-Point Numeric Base Conversion", "doi": null, "abstractUrl": "/journal/tc/1970/08/01671610/13rRUxC0SNF", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2011/02/ttc2011020214", "title": "Computing Floating-Point Square Roots via Bivariate Polynomial Evaluation", "doi": null, "abstractUrl": "/journal/tc/2011/02/ttc2011020214/13rRUxjQyus", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1991/09/t1065", "title": "Pseudorandom Rounding for Truncated Multipliers", "doi": null, "abstractUrl": "/journal/tc/1991/09/t1065/13rRUxjyX2X", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2000/07/t0638", "title": "A Comparison of Three Rounding Algorithms for IEEE Floating-Point Multiplication", "doi": null, "abstractUrl": "/journal/tc/2000/07/t0638/13rRUy3gncu", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2013/07/ttc2013071460", "title": "Binary Integer Decimal-Based Floating-Point Multiplication", "doi": null, "abstractUrl": "/journal/tc/2013/07/ttc2013071460/13rRUytF411", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "01672913", "articleId": "13rRUxASuWN", "__typename": "AdjacentArticleType" }, "next": { "fno": "01672915", "articleId": "13rRUNvya84", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNC8uRnm", "title": "January", "year": "2007", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": "29", "label": "January", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxYrbNn", "doi": "10.1109/TPAMI.2007.20", "abstract": "A digital disc is the set of all integer points inside some given disc. Let {\\cal D}_{N} be the number of different digital discs consisting of N points (different up to translation). The upper bound {\\cal D}_{N} = {\\cal O}(N^{2}) was shown recently; no corresponding lower bound is known. In this paper, we refine the upper bound to {\\cal D}_{N} = {\\cal O}(N), which seems to be the true order of magnitude, and we show that the average \\overline{\\cal D}_{N} = \\left({\\cal D}_{1} + {\\cal D}_{2} + \\ldots + {\\cal D}_{N}\\right)/N has upper and lower bounds which are of polynomial growth in N.", "abstracts": [ { "abstractType": "Regular", "content": "A digital disc is the set of all integer points inside some given disc. Let {\\cal D}_{N} be the number of different digital discs consisting of N points (different up to translation). The upper bound {\\cal D}_{N} = {\\cal O}(N^{2}) was shown recently; no corresponding lower bound is known. In this paper, we refine the upper bound to {\\cal D}_{N} = {\\cal O}(N), which seems to be the true order of magnitude, and we show that the average \\overline{\\cal D}_{N} = \\left({\\cal D}_{1} + {\\cal D}_{2} + \\ldots + {\\cal D}_{N}\\right)/N has upper and lower bounds which are of polynomial growth in N.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A digital disc is the set of all integer points inside some given disc. Let {\\cal D}_{N} be the number of different digital discs consisting of N points (different up to translation). The upper bound {\\cal D}_{N} = {\\cal O}(N^{2}) was shown recently; no corresponding lower bound is known. In this paper, we refine the upper bound to {\\cal D}_{N} = {\\cal O}(N), which seems to be the true order of magnitude, and we show that the average \\overline{\\cal D}_{N} = \\left({\\cal D}_{1} + {\\cal D}_{2} + \\ldots + {\\cal D}_{N}\\right)/N has upper and lower bounds which are of polynomial growth in N.", "title": "The Number of N-Point Digital Discs", "normalizedTitle": "The Number of N-Point Digital Discs", "fno": "i0159", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Digital Disc", "Digitization", "Enumeration", "Digital Geometry" ], "authors": [ { "givenName": "Martin N.", "surname": "Huxley", "fullName": "Martin N. Huxley", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Joviša", "surname": "Žunić", "fullName": "Joviša Žunić", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2007-01-01 00:00:00", "pubType": "trans", "pages": "159-161", "year": "2007", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icassp/1988/9999/0/00196717", "title": "Boundary value transient suppression for N-D digital systems", "doi": null, "abstractUrl": "/proceedings-article/icassp/1988/00196717/12OmNAiFI7y", "parentPublication": { "id": "proceedings/icassp/1988/9999/0", "title": "ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/1995/7165/0/71650386", "title": "A self-timed redundant-binary number to binary number converter for digital arithmetic processors", "doi": null, "abstractUrl": "/proceedings-article/iccd/1995/71650386/12OmNBO3KeW", "parentPublication": { "id": "proceedings/iccd/1995/7165/0", "title": "Proceedings of ICCD '95 International Conference on Computer Design. VLSI in Computers and Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1988/0862/0/00196299", "title": "On the number of digital straight lines on an N*N grid", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1988/00196299/12OmNvEQseA", "parentPublication": { "id": "proceedings/cvpr/1988/0862/0", "title": "Proceedings CVPR '88: The Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1995/7042/0/70420951", "title": "On the geometry and algebra of the point and line correspondences between N images", "doi": null, "abstractUrl": "/proceedings-article/iccv/1995/70420951/12OmNy5zsuC", "parentPublication": { "id": "proceedings/iccv/1995/7042/0", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2011/4571/0/4571a542", "title": "On Range Searching in the Group Model and Combinatorial Discrepancy", "doi": null, "abstractUrl": "/proceedings-article/focs/2011/4571a542/12OmNz61d0Q", "parentPublication": { "id": "proceedings/focs/2011/4571/0", "title": "2011 IEEE 52nd Annual Symposium on Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2010/11/ttp2010112006", "title": "Detecting the Number of Clusters in n-Way Probabilistic Clustering", "doi": null, "abstractUrl": "/journal/tp/2010/11/ttp2010112006/13rRUNvPLaO", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2001/09/l0875", "title": "Optimal Algorithms for the Multiple Query Problem on Reconfigurable Meshes, with Applications", "doi": null, "abstractUrl": "/journal/td/2001/09/l0875/13rRUwhpBNJ", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1998/08/t0894", "title": "A Geometric Approach to Maximum-Speed n-Dimensional Continuous Linear Interpolation in Rectangular Grids", "doi": null, "abstractUrl": "/journal/tc/1998/08/t0894/13rRUxASuXa", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2001/06/l0598", "title": "Augmented Ring Networks", "doi": null, "abstractUrl": "/journal/td/2001/06/l0598/13rRUygBwhi", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compauto/2022/8194/0/819400a032", "title": "A Semi-automated Method to Measure the Height of Lumbar Intervertebral Discs", "doi": null, "abstractUrl": "/proceedings-article/compauto/2022/819400a032/1KxUcInSm5O", "parentPublication": { "id": "proceedings/compauto/2022/8194/0", "title": "2022 2nd International Conference on Computers and Automation (CompAuto)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "i0141", "articleId": "13rRUzpzeC6", "__typename": "AdjacentArticleType" }, "next": { "fno": "i0162", "articleId": "13rRUwfZC1r", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyugyDy", "title": "December", "year": "1971", "issueNum": "12", "idPrefix": "tc", "pubType": "journal", "volume": "20", "label": "December", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyuvRvT", "doi": "10.1109/T-C.1971.223174", "abstract": "It is well known that there is a possible tradeoff in the binary representation of floating-point numbers in which one bit of accuracy can be gained at the cost of halving the exponent range, and vice versa. A way in which the exponent range can be greatly increased while preserving full accuracy for most computations is suggested.", "abstracts": [ { "abstractType": "Regular", "content": "It is well known that there is a possible tradeoff in the binary representation of floating-point numbers in which one bit of accuracy can be gained at the cost of halving the exponent range, and vice versa. A way in which the exponent range can be greatly increased while preserving full accuracy for most computations is suggested.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "It is well known that there is a possible tradeoff in the binary representation of floating-point numbers in which one bit of accuracy can be gained at the cost of halving the exponent range, and vice versa. A way in which the exponent range can be greatly increased while preserving full accuracy for most computations is suggested.", "title": "Tapered Floating Point: A New Floating-Point Representation", "normalizedTitle": "Tapered Floating Point: A New Floating-Point Representation", "fno": "01671767", "hasPdf": true, "idPrefix": "tc", "keywords": [ "Acuracy", "Exponent Range", "Floating Point", "Number Representation" ], "authors": [ { "givenName": "R.", "surname": "Morris", "fullName": "R. Morris", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "1971-12-01 00:00:00", "pubType": "trans", "pages": "1578-1579", "year": "1971", "issn": "0018-9340", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/arith/1989/8963/0/00072803", "title": "On a tapered floating point system", "doi": null, "abstractUrl": "/proceedings-article/arith/1989/00072803/12OmNBB0c0Q", "parentPublication": { "id": "proceedings/arith/1989/8963/0", "title": "9th Symposium on Computer Arithmetic", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fpl/2005/9362/0/01515822", "title": "Dual fixed-point: an efficient alternative to floating-point computation for DSP applications", "doi": null, "abstractUrl": "/proceedings-article/fpl/2005/01515822/12OmNqBKTXk", "parentPublication": { "id": "proceedings/fpl/2005/9362/0", "title": "Proceedings. 2005 International Conference on Field Programmable Logic and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/arith/1993/3862/0/00378100", "title": "Floating point Cordic", "doi": null, "abstractUrl": "/proceedings-article/arith/1993/00378100/12OmNro0I6m", "parentPublication": { "id": "proceedings/arith/1993/3862/0", "title": "Proceedings of IEEE 11th Symposium on Computer Arithmetic", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/arith/1978/9999/0/06155786", "title": "Required scientific floating point arithmetic", "doi": null, "abstractUrl": "/proceedings-article/arith/1978/06155786/12OmNzayNnh", "parentPublication": { "id": "proceedings/arith/1978/9999/0", "title": "Computer Arithmetic, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1975/08/01672914", "title": "On the Floating Point Representation of Complex Numbers", "doi": null, "abstractUrl": "/journal/tc/1975/08/01672914/13rRUwhHcI0", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1974/01/01672365", "title": "Floating-Point Arithmetic Algorithms in the Symmetric Residue Number System", "doi": null, "abstractUrl": "/journal/tc/1974/01/01672365/13rRUx0geu4", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2000/01/t0033", "title": "An IEEE Compliant Floating-Point Adder that Conforms with the Pipelined Packet-Forwarding Paradigm", "doi": null, "abstractUrl": "/journal/tc/2000/01/t0033/13rRUx0xPuK", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1992/08/t1033", "title": "Overflow/Underflow-Free Floating-Point Number Representations with Self-Delimiting Variable-Length Exponent Field", "doi": null, "abstractUrl": "/journal/tc/1992/08/t1033/13rRUxASuF6", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2013/07/ttc2013071376", "title": "Low-Cost Concurrent Error Detection for Floating-Point Unit (FPU) Controllers", "doi": null, "abstractUrl": "/journal/tc/2013/07/ttc2013071376/13rRUxC0Svt", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2006/03/t0254", "title": "Double-Residue Modular Range Reduction for Floating-Point Hardware Implementations", "doi": null, "abstractUrl": "/journal/tc/2006/03/t0254/13rRUynHuii", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "01671764", "articleId": "13rRUx0xPHc", "__typename": "AdjacentArticleType" }, "next": { "fno": "01671768", "articleId": "13rRUxC0SNI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBNM93d", "title": "Nov.", "year": "2015", "issueNum": "11", "idPrefix": "tg", "pubType": "journal", "volume": "21", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUIIVlkk", "doi": "10.1109/TVCG.2015.2459905", "abstract": "This paper proposes a novel radiometric compensation technique for cooperative projection system based-on distributed optimization. To achieve high scalability and robustness, we assume cooperative projection environments such that 1. each projector does not have information about other projectors as well as target images, 2. the camera does not have information about the projectors either, while having the target images, and 3. only a broadcast communication from the camera to the projectors is allowed to suppress the data transfer bandwidth. To this end, we first investigate a distributed optimization based feedback mechanism that is suitable for the required decentralized information processing environment. Next, we show that this mechanism works well for still image projection, however not necessary for moving images due to the lack of dynamic responsiveness. To overcome this issue, we propose to implement an additional feedforward mechanism. Such a 2 Degree Of Freedom (2-DOF) control structure is well-known in control engineering community as a typical method to enhance not only disturbance rejection but also reference tracking capability, simultaneously. We theoretically guarantee and experimentally demonstrate that this 2-DOF structure yields the moving image projection accuracy that is overwhelming the best achievable performance only by the distributed optimization mechanisms.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes a novel radiometric compensation technique for cooperative projection system based-on distributed optimization. To achieve high scalability and robustness, we assume cooperative projection environments such that 1. each projector does not have information about other projectors as well as target images, 2. the camera does not have information about the projectors either, while having the target images, and 3. only a broadcast communication from the camera to the projectors is allowed to suppress the data transfer bandwidth. To this end, we first investigate a distributed optimization based feedback mechanism that is suitable for the required decentralized information processing environment. Next, we show that this mechanism works well for still image projection, however not necessary for moving images due to the lack of dynamic responsiveness. To overcome this issue, we propose to implement an additional feedforward mechanism. Such a 2 Degree Of Freedom (2-DOF) control structure is well-known in control engineering community as a typical method to enhance not only disturbance rejection but also reference tracking capability, simultaneously. We theoretically guarantee and experimentally demonstrate that this 2-DOF structure yields the moving image projection accuracy that is overwhelming the best achievable performance only by the distributed optimization mechanisms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes a novel radiometric compensation technique for cooperative projection system based-on distributed optimization. To achieve high scalability and robustness, we assume cooperative projection environments such that 1. each projector does not have information about other projectors as well as target images, 2. the camera does not have information about the projectors either, while having the target images, and 3. only a broadcast communication from the camera to the projectors is allowed to suppress the data transfer bandwidth. To this end, we first investigate a distributed optimization based feedback mechanism that is suitable for the required decentralized information processing environment. Next, we show that this mechanism works well for still image projection, however not necessary for moving images due to the lack of dynamic responsiveness. To overcome this issue, we propose to implement an additional feedforward mechanism. Such a 2 Degree Of Freedom (2-DOF) control structure is well-known in control engineering community as a typical method to enhance not only disturbance rejection but also reference tracking capability, simultaneously. We theoretically guarantee and experimentally demonstrate that this 2-DOF structure yields the moving image projection accuracy that is overwhelming the best achievable performance only by the distributed optimization mechanisms.", "title": "Radiometric Compensation for Cooperative Distributed Multi-Projection System Through 2-DOF Distributed Control", "normalizedTitle": "Radiometric Compensation for Cooperative Distributed Multi-Projection System Through 2-DOF Distributed Control", "fno": "07164338", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Bandwidth Compression", "Broadcast Communication", "Cameras", "Data Communication", "Distributed Control", "Feedforward", "Image Motion Analysis", "Motion Compensation", "Optical Projectors", "Optimisation", "Radiometry", "Radiometric Compensation", "Cooperative Distributed Multiprojection System", "2 DOF Distributed Control", "Broadcast Communication", "Camera", "Projector", "Data Transfer Bandwidth Suppression", "Distributed Optimization Based Feedback Mechanism", "Decentralized Information Processing", "Still Image Projection", "Dynamic Responsiveness", "Feedforward Mechanism", "Degree Of Freedom", "Moving Image Projection Accuracy", "Radiometry", "Cameras", "Feedforward Neural Networks", "Optimization", "Motion Pictures", "Robustness", "Control Theory", "Projector Camera System", "Radiometric Compensation", "Distributed Optimization", "Control Theory", "Projector Camera System", "Radiometric Compensation", "Distributed Optimization", "Control Theory" ], "authors": [ { "givenName": "Jun", "surname": "Tsukamoto", "fullName": "Jun Tsukamoto", "affiliation": "Kyoto University", "__typename": "ArticleAuthorType" }, { "givenName": "Daisuke", "surname": "Iwai", "fullName": "Daisuke Iwai", "affiliation": "Kyoto University", "__typename": "ArticleAuthorType" }, { "givenName": "Kenji", "surname": "Kashima", "fullName": "Kenji Kashima", "affiliation": "Kyoto University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2015-11-01 00:00:00", "pubType": "trans", "pages": "1221-1229", "year": "2015", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iiaiaai/2014/4174/0/06913421", "title": "Development of Projection Mapping with Utility of Digital Signage", "doi": null, "abstractUrl": "/proceedings-article/iiaiaai/2014/06913421/12OmNAnMuFg", "parentPublication": { "id": "proceedings/iiaiaai/2014/4174/0", "title": "2014 IIAI 3rd International Conference on Advanced Applied Informatics (IIAIAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pg/2007/3009/0/30090391", "title": "Radiometric Compensation through Inverse Light Transport", "doi": null, "abstractUrl": "/proceedings-article/pg/2007/30090391/12OmNqIzgUn", "parentPublication": { "id": "proceedings/pg/2007/3009/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2013/2576/0/06815049", "title": "Real-Time Appearance Modification of Textured Object Using Superimposed Projection", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2013/06815049/12OmNyeECsK", "parentPublication": { "id": "proceedings/cad-graphics/2013/2576/0", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/2001/7201/0/00964509", "title": "Dynamic shadow removal from front projection displays", "doi": null, "abstractUrl": "/proceedings-article/visual/2001/00964509/12OmNzDehdU", "parentPublication": { "id": "proceedings/visual/2001/7201/0", "title": "Proceedings VIS 2001. Visualization 2001", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836483", "title": "Distributed Optimization for Shadow Removal in Spatial Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836483/12OmNzEVS0M", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2009/3943/0/04810996", "title": "A Distributed Cooperative Framework for Continuous Multi-Projector Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/vr/2009/04810996/12OmNzV70vz", "parentPublication": { "id": "proceedings/vr/2009/3943/0", "title": "2009 IEEE Virtual Reality Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/01/ttg2008010097", "title": "Real-Time Adaptive Radiometric Compensation", "doi": null, "abstractUrl": "/journal/tg/2008/01/ttg2008010097/13rRUwhpBE2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/04/v0658", "title": "Multifocal Projection: A Multiprojector Technique for Increasing Focal Depth", "doi": null, "abstractUrl": "/journal/tg/2006/04/v0658/13rRUypp57x", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a750", "title": "Perceptually-Based Optimization for Radiometric Projector Compensation", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a750/1CJd3VypH7G", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cost/2022/6248/0/624800a180", "title": "Review of Photometric Compensation in Projection System", "doi": null, "abstractUrl": "/proceedings-article/cost/2022/624800a180/1H2pilDW8ww", "parentPublication": { "id": "proceedings/cost/2022/6248/0", "title": "2022 International Conference on Culture-Oriented Science and Technology (CoST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07164353", "articleId": "13rRUEgs2M6", "__typename": "AdjacentArticleType" }, "next": { "fno": "07165661", "articleId": "13rRUwI5U2K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNqzu6WQ", "title": "July-September", "year": "2010", "issueNum": "03", "idPrefix": "lt", "pubType": "journal", "volume": "3", "label": "July-September", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUNvgz6o", "doi": "10.1109/TLT.2010.15", "abstract": "In line with the popularity of the Internet and the development of search engine, users request information through web-based services. Although general-purpose searching such as one provided by Google is powerful, searching mechanism for specific purposes could rely on metadata. In distance learning (or e-learning), SCORM provides an efficient metadata definition for learning objects to be searched and shared. To facilitate searching in a federated repository, CORDRA provides a common architecture for discovering and sharing Learning Objects. We followed SCORM and CORDRA specifications to develop a registry system, called the MINE Registry, for storing and sharing 20,738 Learning Objects created in the past five years. As a contribution, we propose the concept of “Reusability Tree” to represent the relationships among relevant Learning Objects and enhance CORDRA. We further collect relevant information, while users are utilizing Learning Objects, such as citations and time period persisted. The feedbacks from the user community are also considered as critical elements for evaluating significance degree of Learning Objects. Through theses factors, we propose a mechanism to weight and rank Learning Objects in the MINE Registry, in addition to other external learning objects repositories. As a practical contribution, we provide a tool called “Search Guider” to assist users in finding relevant information in Learning Objects based on individual requirements.", "abstracts": [ { "abstractType": "Regular", "content": "In line with the popularity of the Internet and the development of search engine, users request information through web-based services. Although general-purpose searching such as one provided by Google is powerful, searching mechanism for specific purposes could rely on metadata. In distance learning (or e-learning), SCORM provides an efficient metadata definition for learning objects to be searched and shared. To facilitate searching in a federated repository, CORDRA provides a common architecture for discovering and sharing Learning Objects. We followed SCORM and CORDRA specifications to develop a registry system, called the MINE Registry, for storing and sharing 20,738 Learning Objects created in the past five years. As a contribution, we propose the concept of “Reusability Tree” to represent the relationships among relevant Learning Objects and enhance CORDRA. We further collect relevant information, while users are utilizing Learning Objects, such as citations and time period persisted. The feedbacks from the user community are also considered as critical elements for evaluating significance degree of Learning Objects. Through theses factors, we propose a mechanism to weight and rank Learning Objects in the MINE Registry, in addition to other external learning objects repositories. As a practical contribution, we provide a tool called “Search Guider” to assist users in finding relevant information in Learning Objects based on individual requirements.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In line with the popularity of the Internet and the development of search engine, users request information through web-based services. Although general-purpose searching such as one provided by Google is powerful, searching mechanism for specific purposes could rely on metadata. In distance learning (or e-learning), SCORM provides an efficient metadata definition for learning objects to be searched and shared. To facilitate searching in a federated repository, CORDRA provides a common architecture for discovering and sharing Learning Objects. We followed SCORM and CORDRA specifications to develop a registry system, called the MINE Registry, for storing and sharing 20,738 Learning Objects created in the past five years. As a contribution, we propose the concept of “Reusability Tree” to represent the relationships among relevant Learning Objects and enhance CORDRA. We further collect relevant information, while users are utilizing Learning Objects, such as citations and time period persisted. The feedbacks from the user community are also considered as critical elements for evaluating significance degree of Learning Objects. Through theses factors, we propose a mechanism to weight and rank Learning Objects in the MINE Registry, in addition to other external learning objects repositories. As a practical contribution, we provide a tool called “Search Guider” to assist users in finding relevant information in Learning Objects based on individual requirements.", "title": "Ranking Metrics and Search Guidance for Learning Object Repository", "normalizedTitle": "Ranking Metrics and Search Guidance for Learning Object Repository", "fno": "tlt2010030250", "hasPdf": true, "idPrefix": "lt", "keywords": [ "CORDRA", "LOM", "Learning Object Repository", "Ranking Metrics", "Search Guidance", "Reusability Tree", "Social Feedback", "Information Retrieval", "Distance Learning" ], "authors": [ { "givenName": "Neil Y.", "surname": "Yen", "fullName": "Neil Y. Yen", "affiliation": "Waseda University, Japan", "__typename": "ArticleAuthorType" }, { "givenName": "Timothy K.", "surname": "Shih", "fullName": "Timothy K. Shih", "affiliation": "Asia University, Taiwan", "__typename": "ArticleAuthorType" }, { "givenName": "Louis R.", "surname": "Chao", "fullName": "Louis R. Chao", "affiliation": "Tamkang University, Taiwan", "__typename": "ArticleAuthorType" }, { "givenName": "Qun", "surname": "Jin", "fullName": "Qun Jin", "affiliation": "Waseda University, Japan", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "03", "pubDate": "2010-07-01 00:00:00", "pubType": "trans", "pages": "250-264", "year": "2010", "issn": "1939-1382", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icis/2005/2296/0/22960328", "title": "A Process-Driven e-Learning Content Organization Model", "doi": null, "abstractUrl": "/proceedings-article/icis/2005/22960328/12OmNAPSMlY", "parentPublication": { "id": "proceedings/icis/2005/2296/0", "title": "Proceedings. Fourth Annual ACIS International Conference on Computer and Information Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icppw/2007/2934/0/29340026", "title": "Enhancing Reusability of Learning Objects with Object-Oriented Inheritance Relationships", "doi": null, "abstractUrl": "/proceedings-article/icppw/2007/29340026/12OmNBO3KdX", "parentPublication": { "id": "proceedings/icppw/2007/2934/0", "title": "2007 International Conference on Parallel Processing Workshops (ICPPW 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2011/4609/0/4609a389", "title": "DREX: Developer Recommendation with K-Nearest-Neighbor Search and Expertise Ranking", "doi": null, "abstractUrl": "/proceedings-article/apsec/2011/4609a389/12OmNC4wtDh", "parentPublication": { "id": "proceedings/apsec/2011/4609/0", "title": "2011 18th Asia-Pacific Software Engineering Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2009/3711/0/3711a285", "title": "Editing and Managing Learning Objects Using Agrega Offline", "doi": null, "abstractUrl": "/proceedings-article/icalt/2009/3711a285/12OmNCmGNXA", "parentPublication": { "id": "proceedings/icalt/2009/3711/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2008/3167/0/3167a114", "title": "A Repository with Semantic Organization for Educational Content", "doi": null, "abstractUrl": "/proceedings-article/icalt/2008/3167a114/12OmNx3Zjcd", "parentPublication": { "id": "proceedings/icalt/2008/3167/0", "title": "IEEE International Conference on Advanced Learning Technologies (ICALT 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2006/2632/0/263200208", "title": "An Ontological Approach for Semantic-Aware Learning Object Retrieval", "doi": null, "abstractUrl": "/proceedings-article/icalt/2006/263200208/12OmNzBOijT", "parentPublication": { "id": "proceedings/icalt/2006/2632/0", "title": "Sixth International Conference on Advanced Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2008/3496/1/3496a747", "title": "QoS Based Ranking for Web Search", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2008/3496a747/12OmNzC5Trg", "parentPublication": { "id": "proceedings/wi-iat/2008/3496/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2009/3711/0/3711a701", "title": "Weighting and Ranking the E-learning Resources", "doi": null, "abstractUrl": "/proceedings-article/icalt/2009/3711a701/12OmNzGlRIC", "parentPublication": { "id": "proceedings/icalt/2009/3711/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2009/3596/0/3596b140", "title": "A Proposesd Ontology for Effective Searching of Sharable Content Objects Emphasizing on Learning Objectives", "doi": null, "abstractUrl": "/proceedings-article/itng/2009/3596b140/12OmNzTYCaF", "parentPublication": { "id": "proceedings/itng/2009/3596/0", "title": "Information Technology: New Generations, Third International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2009/06/ttk2009060925", "title": "An Implementation of the CORDRA Architecture Enhanced for Systematic Reuse of Learning Objects", "doi": null, "abstractUrl": "/journal/tk/2009/06/ttk2009060925/13rRUyfKIIe", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "tlt2010030237", "articleId": "13rRUyft7zx", "__typename": "AdjacentArticleType" }, "next": { "fno": "tlt2010030265", "articleId": "13rRUxbTMv2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzXnNEo", "title": "September", "year": "1995", "issueNum": "03", "idPrefix": "tg", "pubType": "journal", "volume": "1", "label": "September", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwbJD4B", "doi": "10.1109/2945.466718", "abstract": "Abstract—A line-art nonphotorealistic rendering scheme of scenes composed of freeform surfaces is presented. A freeform surface coverage is constructed using a set of isoparametric curves. The density of the isoparametric curves is set to be a function of the illumination of the surface determined using a simple shading model, or of regions of special importance such as silhouettes. The outcome is one way of achieving an aesthetic and attractive line-art rendering that employs isoparametric curve based drawings that is suitable for printing publication.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—A line-art nonphotorealistic rendering scheme of scenes composed of freeform surfaces is presented. A freeform surface coverage is constructed using a set of isoparametric curves. The density of the isoparametric curves is set to be a function of the illumination of the surface determined using a simple shading model, or of regions of special importance such as silhouettes. The outcome is one way of achieving an aesthetic and attractive line-art rendering that employs isoparametric curve based drawings that is suitable for printing publication.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—A line-art nonphotorealistic rendering scheme of scenes composed of freeform surfaces is presented. A freeform surface coverage is constructed using a set of isoparametric curves. The density of the isoparametric curves is set to be a function of the illumination of the surface determined using a simple shading model, or of regions of special importance such as silhouettes. The outcome is one way of achieving an aesthetic and attractive line-art rendering that employs isoparametric curve based drawings that is suitable for printing publication.", "title": "Line Art Rendering via a Coverage of Isoparametric Curves", "normalizedTitle": "Line Art Rendering via a Coverage of Isoparametric Curves", "fno": "v0231", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Sketches", "Illustrations", "Line Drawings", "Freeform Surfaces", "NUR Bs", "Gridless Halftoning", "Printing" ], "authors": [ { "givenName": "Gershon", "surname": "Elber", "fullName": "Gershon Elber", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "03", "pubDate": "1995-07-01 00:00:00", "pubType": "trans", "pages": "231-239", "year": "1995", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "v0218", "articleId": "13rRUxBJhFh", "__typename": "AdjacentArticleType" }, "next": { "fno": "v0240", "articleId": "13rRUyYBlgn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNs5rl33", "title": "August", "year": "2002", "issueNum": "08", "idPrefix": "tp", "pubType": "journal", "volume": "24", "label": "August", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUx0Pqqr", "doi": "10.1109/TPAMI.2002.1023803", "abstract": "We present an algorithm for extracting and classifying two-dimensional motion in an image sequence based on motion trajectories. First, a multiscale segmentation is performed to generate homogeneous regions in each frame. Regions between consecutive frames are then matched to obtain two-view correspondences. Affine transformations are computed from each pair of corresponding regions to define pixel matches. Pixels matches over consecutive image pairs are concatenated to obtain pixel-level motion trajectories across the image sequence. Motion patterns are learned from the extracted trajectories using a time-delay neural network. We apply the proposed method to recognize 40 hand gestures of American Sign Language. Experimental results show that motion patterns of hand gestures can be extracted and recognized accurately using motion trajectories.", "abstracts": [ { "abstractType": "Regular", "content": "We present an algorithm for extracting and classifying two-dimensional motion in an image sequence based on motion trajectories. First, a multiscale segmentation is performed to generate homogeneous regions in each frame. Regions between consecutive frames are then matched to obtain two-view correspondences. Affine transformations are computed from each pair of corresponding regions to define pixel matches. Pixels matches over consecutive image pairs are concatenated to obtain pixel-level motion trajectories across the image sequence. Motion patterns are learned from the extracted trajectories using a time-delay neural network. We apply the proposed method to recognize 40 hand gestures of American Sign Language. Experimental results show that motion patterns of hand gestures can be extracted and recognized accurately using motion trajectories.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present an algorithm for extracting and classifying two-dimensional motion in an image sequence based on motion trajectories. First, a multiscale segmentation is performed to generate homogeneous regions in each frame. Regions between consecutive frames are then matched to obtain two-view correspondences. Affine transformations are computed from each pair of corresponding regions to define pixel matches. Pixels matches over consecutive image pairs are concatenated to obtain pixel-level motion trajectories across the image sequence. Motion patterns are learned from the extracted trajectories using a time-delay neural network. We apply the proposed method to recognize 40 hand gestures of American Sign Language. Experimental results show that motion patterns of hand gestures can be extracted and recognized accurately using motion trajectories.", "title": "Extraction of 2D Motion Trajectories and Its Application to Hand Gesture Recognition", "normalizedTitle": "Extraction of 2D Motion Trajectories and Its Application to Hand Gesture Recognition", "fno": "i1061", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Motion Segmentation", "Motion Analysis", "Motion Trajectory", "American Sign Language", "Hand Gesture Recognition", "Time Delay Neural Network" ], "authors": [ { "givenName": "Ming-Hsuan", "surname": "Yang", "fullName": "Ming-Hsuan Yang", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Narendra", "surname": "Ahuja", "fullName": "Narendra Ahuja", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Mark", "surname": "Tabb", "fullName": "Mark Tabb", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "08", "pubDate": "2002-08-01 00:00:00", "pubType": "trans", "pages": "1061-1074", "year": "2002", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "i1048", "articleId": "13rRUwInvKs", "__typename": "AdjacentArticleType" }, "next": { "fno": "i1075", "articleId": "13rRUNvyalY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyaoDzf", "title": "March/April", "year": "2010", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "16", "label": "March/April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwdIOUF", "doi": "10.1109/TVCG.2009.76", "abstract": "We present a physics-based approach to generate 3D biped character animation that can react to dynamical environments in real time. Our approach utilizes an inverted pendulum model to online adjust the desired motion trajectory from the input motion capture data. This online adjustment produces a physically plausible motion trajectory adapted to dynamic environments, which is then used as the desired motion for the motion controllers to track in dynamics simulation. Rather than using Proportional-Derivative controllers whose parameters usually cannot be easily set, our motion tracking adopts a velocity-driven method which computes joint torques based on the desired joint angular velocities. Physically correct full-body motion of the 3D character is computed in dynamics simulation using the computed torques and dynamical model of the character. Our experiments demonstrate that tracking motion capture data with real-time response animation can be achieved easily. In addition, physically plausible motion style editing, automatic motion transition, and motion adaptation to different limb sizes can also be generated without difficulty.", "abstracts": [ { "abstractType": "Regular", "content": "We present a physics-based approach to generate 3D biped character animation that can react to dynamical environments in real time. Our approach utilizes an inverted pendulum model to online adjust the desired motion trajectory from the input motion capture data. This online adjustment produces a physically plausible motion trajectory adapted to dynamic environments, which is then used as the desired motion for the motion controllers to track in dynamics simulation. Rather than using Proportional-Derivative controllers whose parameters usually cannot be easily set, our motion tracking adopts a velocity-driven method which computes joint torques based on the desired joint angular velocities. Physically correct full-body motion of the 3D character is computed in dynamics simulation using the computed torques and dynamical model of the character. Our experiments demonstrate that tracking motion capture data with real-time response animation can be achieved easily. In addition, physically plausible motion style editing, automatic motion transition, and motion adaptation to different limb sizes can also be generated without difficulty.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a physics-based approach to generate 3D biped character animation that can react to dynamical environments in real time. Our approach utilizes an inverted pendulum model to online adjust the desired motion trajectory from the input motion capture data. This online adjustment produces a physically plausible motion trajectory adapted to dynamic environments, which is then used as the desired motion for the motion controllers to track in dynamics simulation. Rather than using Proportional-Derivative controllers whose parameters usually cannot be easily set, our motion tracking adopts a velocity-driven method which computes joint torques based on the desired joint angular velocities. Physically correct full-body motion of the 3D character is computed in dynamics simulation using the computed torques and dynamical model of the character. Our experiments demonstrate that tracking motion capture data with real-time response animation can be achieved easily. In addition, physically plausible motion style editing, automatic motion transition, and motion adaptation to different limb sizes can also be generated without difficulty.", "title": "Real-Time Physics-Based 3D Biped Character Animation Using an Inverted Pendulum Model", "normalizedTitle": "Real-Time Physics-Based 3D Biped Character Animation Using an Inverted Pendulum Model", "fno": "ttg2010020325", "hasPdf": true, "idPrefix": "tg", "keywords": [ "3 D Human Motion", "Physics Based Simulation", "Biped Walk And Balance", "Motion Capture Data" ], "authors": [ { "givenName": "Yao-Yang", "surname": "Tsai", "fullName": "Yao-Yang Tsai", "affiliation": "National Cheng-Kung University, Tainan", "__typename": "ArticleAuthorType" }, { "givenName": "Wen-Chieh", "surname": "Lin", "fullName": "Wen-Chieh Lin", "affiliation": "National Chiao-Tung University, Hsinchu", "__typename": "ArticleAuthorType" }, { "givenName": "Kuangyou B.", "surname": "Cheng", "fullName": "Kuangyou B. Cheng", "affiliation": "National Cheng-Kung University, Tainan", "__typename": "ArticleAuthorType" }, { "givenName": "Jehee", "surname": "Lee", "fullName": "Jehee Lee", "affiliation": "Seoul National University, Seoul", "__typename": "ArticleAuthorType" }, { "givenName": "Tong-Yee", "surname": "Lee", "fullName": "Tong-Yee Lee", "affiliation": "National Cheng-Kung University, Tainan", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2010-03-01 00:00:00", "pubType": "trans", "pages": "325-337", "year": "2010", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/paciia/2008/3490/1/3490a100", "title": "Research on the Model of the Inverted Pendulum and Its Control Based on Biped Robot", "doi": null, "abstractUrl": "/proceedings-article/paciia/2008/3490a100/12OmNAXglLM", "parentPublication": { "id": "proceedings/paciia/2008/3490/1", "title": "Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2010/4215/0/4215a046", "title": "Building Hand Motion-Based Character Animation: The Case of Puppetry", "doi": null, "abstractUrl": "/proceedings-article/cw/2010/4215a046/12OmNAle6A0", "parentPublication": { "id": "proceedings/cw/2010/4215/0", "title": "2010 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dmdcm/2011/4413/0/4413a086", "title": "A Review of Dynamic Motion Control Considering Physics for Real Time Animation Character", "doi": null, "abstractUrl": "/proceedings-article/dmdcm/2011/4413a086/12OmNBJeyHe", "parentPublication": { "id": "proceedings/dmdcm/2011/4413/0", "title": "Digital Media and Digital Content Management, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2009/3600/2/3600b579", "title": "A Method for Lateral Motion Planning on the Biped Robot", "doi": null, "abstractUrl": "/proceedings-article/ifita/2009/3600b579/12OmNC8dglI", "parentPublication": { "id": "proceedings/ifita/2009/3600/2", "title": "2009 International Forum on Information Technology and Applications (IFITA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichit/2008/3328/0/3328a222", "title": "Character Animation Tool ?Biped Hand Selector?", "doi": null, "abstractUrl": "/proceedings-article/ichit/2008/3328a222/12OmNrkT7y9", "parentPublication": { "id": "proceedings/ichit/2008/3328/0", "title": "2008 International Conference on Convergence and Hybrid Information Technology (ICHIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1996/7588/0/75880016", "title": "User-Controlled Physics-Based Animation for Articulated Figures", "doi": null, "abstractUrl": "/proceedings-article/ca/1996/75880016/12OmNvkplhH", "parentPublication": { "id": "proceedings/ca/1996/7588/0", "title": "Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2004/2178/0/21780052", "title": "A Study of Practical Approach of Using Motion Capture and Keyframe Animation Techniques", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2004/21780052/12OmNy3AgDN", "parentPublication": { "id": "proceedings/cgiv/2004/2178/0", "title": "Proceedings. International Conference on Computer Graphics, Imaging and Visualization, 2004. CGIV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2004/2177/0/21770849", "title": "A Study on Practical Approach of Using Motion Capture and Keyframe Animation Techniques", "doi": null, "abstractUrl": "/proceedings-article/iv/2004/21770849/12OmNzdoMvf", "parentPublication": { "id": "proceedings/iv/2004/2177/0", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuvr/2010/4124/0/4124a012", "title": "Physics-Based Character Animation for AR Applications", "doi": null, "abstractUrl": "/proceedings-article/isuvr/2010/4124a012/12OmNzzP5BN", "parentPublication": { "id": "proceedings/isuvr/2010/4124/0", "title": "International Symposium on Ubiquitous Virtual Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/01/ttg2008010173", "title": "Psychologically Inspired Anticipation and Dynamic Response for Impacts to the Head and Upper Body", "doi": null, "abstractUrl": "/journal/tg/2008/01/ttg2008010173/13rRUygT7f3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2010020312", "articleId": "13rRUyp7tWS", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2010020338", "articleId": "13rRUwI5TXw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgzd", "name": "ttg2010020325s.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg2010020325s.zip", "extension": "zip", "size": "69.9 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNvAiSlz", "title": "January/February", "year": "2008", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "14", "label": "January/February", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxD9gXz", "doi": "10.1109/TVCG.2007.70437", "abstract": "We propose a novel approach to proportional derivative (PD) control exploiting the fact that these equations can be solved analytically for a single degree of freedom. The analytic solution indicates what the PD controller would accomplish in isolation without interference from neighboring joints, gravity and external forces, outboard limbs, etc. Our approach to time integration includes an inverse dynamics formulation that automatically incorporates global feedback so that the per joint predictions are achieved. This effectively decouples stiffness from control so that we obtain the desired target regardless of the stiffness of the joint, which merely determines when we get there. We start with simple examples to illustrate our method, and then move on to more complex examples including PD control of line segment muscle actuators.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a novel approach to proportional derivative (PD) control exploiting the fact that these equations can be solved analytically for a single degree of freedom. The analytic solution indicates what the PD controller would accomplish in isolation without interference from neighboring joints, gravity and external forces, outboard limbs, etc. Our approach to time integration includes an inverse dynamics formulation that automatically incorporates global feedback so that the per joint predictions are achieved. This effectively decouples stiffness from control so that we obtain the desired target regardless of the stiffness of the joint, which merely determines when we get there. We start with simple examples to illustrate our method, and then move on to more complex examples including PD control of line segment muscle actuators.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a novel approach to proportional derivative (PD) control exploiting the fact that these equations can be solved analytically for a single degree of freedom. The analytic solution indicates what the PD controller would accomplish in isolation without interference from neighboring joints, gravity and external forces, outboard limbs, etc. Our approach to time integration includes an inverse dynamics formulation that automatically incorporates global feedback so that the per joint predictions are achieved. This effectively decouples stiffness from control so that we obtain the desired target regardless of the stiffness of the joint, which merely determines when we get there. We start with simple examples to illustrate our method, and then move on to more complex examples including PD control of line segment muscle actuators.", "title": "Impulse-Based Control of Joints and Muscles", "normalizedTitle": "Impulse-Based Control of Joints and Muscles", "fno": "ttg2008010037", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Computer Graphics", "Physically Based Modeling", "Animation", "Kinematics And Dynamics" ], "authors": [ { "givenName": "Rachel", "surname": "Weinstein", "fullName": "Rachel Weinstein", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Eran", "surname": "Guendelman", "fullName": "Eran Guendelman", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Ronald", "surname": "Fedkiw", "fullName": "Ronald Fedkiw", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2008-01-01 00:00:00", "pubType": "trans", "pages": "37-46", "year": "2008", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cisis/2009/3575/0/3575b217", "title": "Application of Cylindrical Elastic Elements for Stiffness Control of Tendon-Driven Manipulator and Inverse Kinematics Evaluation", "doi": null, "abstractUrl": "/proceedings-article/cisis/2009/3575b217/12OmNASraJx", "parentPublication": { "id": "proceedings/cisis/2009/3575/0", "title": "2009 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1992/2720/0/00220285", "title": "Adaptive integral manifold control of flexible joint robot manipulators", "doi": null, "abstractUrl": "/proceedings-article/robot/1992/00220285/12OmNAkWvfb", "parentPublication": { "id": "proceedings/robot/1992/2720/0", "title": "Proceedings 1992 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1988/0852/0/00012252", "title": "Robust independent robot joint control: design and experimentation", "doi": null, "abstractUrl": "/proceedings-article/robot/1988/00012252/12OmNwkR5vx", "parentPublication": { "id": "proceedings/robot/1988/0852/0", "title": "Proceedings. 1988 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeae/2015/8328/0/07386219", "title": "Comparative Study of a PID and PD Control Bounded by Hyperbolic Tangent Function in Robot 3 DOF", "doi": null, "abstractUrl": "/proceedings-article/icmeae/2015/07386219/12OmNwvVrH3", "parentPublication": { "id": "proceedings/icmeae/2015/8328/0", "title": "2015 International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1989/1938/0/00099978", "title": "Dynamics coordination in a manipulator with 7 joints", "doi": null, "abstractUrl": "/proceedings-article/robot/1989/00099978/12OmNxeutbT", "parentPublication": { "id": "proceedings/robot/1989/1938/0", "title": "1989 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1988/0852/0/00012199", "title": "Dynamics based control of vertically articulated manipulators", "doi": null, "abstractUrl": "/proceedings-article/robot/1988/00012199/12OmNzVXNNv", "parentPublication": { "id": "proceedings/robot/1988/0852/0", "title": "Proceedings. 1988 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1989/1938/0/00100166", "title": "Open-loop stiffness control of overconstrained mechanisms/robotic linkage systems", "doi": null, "abstractUrl": "/proceedings-article/robot/1989/00100166/12OmNzYNN14", "parentPublication": { "id": "proceedings/robot/1989/1938/0", "title": "1989 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2011/04/mcg2011040056", "title": "Direct Control of Simulated Nonhuman Characters", "doi": null, "abstractUrl": "/magazine/cg/2011/04/mcg2011040056/13rRUwInv93", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/01/ttg2008010173", "title": "Psychologically Inspired Anticipation and Dynamic Response for Impacts to the Head and Upper Body", "doi": null, "abstractUrl": "/journal/tg/2008/01/ttg2008010173/13rRUygT7f3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/02/ttg2012020228", "title": "Cubical Mass-Spring Model Design Based on a Tensile Deformation Test and Nonlinear Material Model", "doi": null, "abstractUrl": "/journal/tg/2012/02/ttg2012020228/13rRUygT7y7", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2008010047", "articleId": "13rRUygT7y4", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2008010061", "articleId": "13rRUxlgy3x", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzVGcI6", "title": "November", "year": "1985", "issueNum": "11", "idPrefix": "tc", "pubType": "journal", "volume": "34", "label": "November", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUILtJkO", "doi": "10.1109/TC.1985.1676541", "abstract": "In the original correspondence,1 Cantarella assumed a system consisting ot n parallel identical elements, each with a constant failure rate A. The system is repaired every T hours. An approximation n(n -1) A2T/2 for the average failure rate was derived. In further correspondence, 2 Nilsson derived an exact ciosed form expression for the failure rate. In this comment, we correct an algebraic error in Nilsson's approximation for small values of A. T, and also point out the relevance of both correspondences to the case where n is small, as in a triple modular redundant (TMR) system.", "abstracts": [ { "abstractType": "Regular", "content": "In the original correspondence,1 Cantarella assumed a system consisting ot n parallel identical elements, each with a constant failure rate A. The system is repaired every T hours. An approximation n(n -1) A2T/2 for the average failure rate was derived. In further correspondence, 2 Nilsson derived an exact ciosed form expression for the failure rate. In this comment, we correct an algebraic error in Nilsson's approximation for small values of A. T, and also point out the relevance of both correspondences to the case where n is small, as in a triple modular redundant (TMR) system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the original correspondence,1 Cantarella assumed a system consisting ot n parallel identical elements, each with a constant failure rate A. The system is repaired every T hours. An approximation n(n -1) A2T/2 for the average failure rate was derived. In further correspondence, 2 Nilsson derived an exact ciosed form expression for the failure rate. In this comment, we correct an algebraic error in Nilsson's approximation for small values of A. T, and also point out the relevance of both correspondences to the case where n is small, as in a triple modular redundant (TMR) system.", "title": "Further Comments on \"The Reliability of Periodically Repaired n ?l/n Parallel Redundant Systems\"", "normalizedTitle": "Further Comments on \"The Reliability of Periodically Repaired n ?l/n Parallel Redundant Systems\"", "fno": "01676541", "hasPdf": true, "idPrefix": "tc", "keywords": [ "Reliability", "Error Correction", "Fault Tolerance", "Parallel Redundant Systems", "Periodic Repair" ], "authors": [ { "givenName": "J.H.", "surname": "Wensley", "fullName": "J.H. Wensley", "affiliation": "August Systems, Inc.", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "11", "pubDate": "1985-11-01 00:00:00", "pubType": "trans", "pages": "1068", "year": "1985", "issn": "0018-9340", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ftcs/1991/2150/0/00146707", "title": "The t(n-1)-diagnosability and its applications to fault tolerance", "doi": null, "abstractUrl": "/proceedings-article/ftcs/1991/00146707/12OmNApLGoN", "parentPublication": { "id": "proceedings/ftcs/1991/2150/0", "title": "Digest of Papers. Fault-Tolerant Computing: The Twenty-First International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-icess/2009/3738/0/3738a384", "title": "N-Level Diskless Checkpointing", "doi": null, "abstractUrl": "/proceedings-article/hpcc-icess/2009/3738a384/12OmNBBzod3", "parentPublication": { "id": "proceedings/hpcc-icess/2009/3738/0", "title": "High Performance Computing and Communication &amp; IEEE International Conference on Embedded Software and Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1988/0842/2/00011858", "title": "New conditions for N-version programming", "doi": null, "abstractUrl": "/proceedings-article/hicss/1988/00011858/12OmNrNh0BQ", "parentPublication": { "id": "proceedings/hicss/1988/0842/2", "title": "Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/1995/2431/2/00480460", "title": "RLS design of polyphase components for the interpolation of periodically nonuniformly sampled signals", "doi": null, "abstractUrl": "/proceedings-article/icassp/1995/00480460/12OmNvlg8gL", "parentPublication": { "id": "proceedings/icassp/1995/2431/2", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2005/2482/0/24820161", "title": "An Experimental Evaluation on Reliability Features of N-Version Programming", "doi": null, "abstractUrl": "/proceedings-article/issre/2005/24820161/12OmNy4r3Sl", "parentPublication": { "id": "proceedings/issre/2005/2482/0", "title": "16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1983/06/01676284", "title": "The Reliability of Periodically Repaired n - I/n Parallel Redundant Systems", "doi": null, "abstractUrl": "/journal/tc/1983/06/01676284/13rRUx0xPuo", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1984/07/05009345", "title": "Comments on \"The Reliability of Periodically Repaired n - 1/n Parallel Redundant Systems", "doi": null, "abstractUrl": "/journal/tc/1984/07/05009345/13rRUxDqS7k", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1989/07/e0926a", "title": "Comments on 'A Distributed Scheme for Detecting Communication Deadlocks' by N. Natarajan", "doi": null, "abstractUrl": "/journal/ts/1989/07/e0926a/13rRUy3xY47", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1995/08/t1055", "title": "On TSC Checkers for m-out-of-n Codes", "doi": null, "abstractUrl": "/journal/tc/1995/08/t1055/13rRUyeCk9f", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "01676540", "articleId": "13rRUwjXZRc", "__typename": "AdjacentArticleType" }, "next": { "fno": "01676542", "articleId": "13rRUxASuav", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwudQTS", "title": "June", "year": "1983", "issueNum": "06", "idPrefix": "tc", "pubType": "journal", "volume": "32", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUx0xPuo", "doi": "10.1109/TC.1983.1676284", "abstract": "The average failure rate of an n - 1/n parallel redundant system of n identical elements, each of which has a constant failure rate of ?, that is repaired every T hours can be approximated by the upper bound n(n - 1)?2T/2. If ?T < 1, the ratio of the upper bound to the actual average failure rate is less than or equal to I + (n -)?T/I - ?T/2. These formulas provide a convenient method f", "abstracts": [ { "abstractType": "Regular", "content": "The average failure rate of an n - 1/n parallel redundant system of n identical elements, each of which has a constant failure rate of ?, that is repaired every T hours can be approximated by the upper bound n(n - 1)?2T/2. If ?T < 1, the ratio of the upper bound to the actual average failure rate is less than or equal to I + (n -)?T/I - ?T/2. These formulas provide a convenient method f", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The average failure rate of an n - 1/n parallel redundant system of n identical elements, each of which has a constant failure rate of ?, that is repaired every T hours can be approximated by the upper bound n(n - 1)?2T/2. If ?T < 1, the ratio of the upper bound to the actual average failure rate is less than or equal to I + (n -)?T/I - ?T/2. These formulas provide a convenient method f", "title": "The Reliability of Periodically Repaired n - I/n Parallel Redundant Systems", "normalizedTitle": "The Reliability of Periodically Repaired n - I/n Parallel Redundant Systems", "fno": "01676284", "hasPdf": true, "idPrefix": "tc", "keywords": [ "Reliability", "Error Correction", "Fault Tolerance", "Parallel Redundant Systems", "Periodic Repair" ], "authors": [ { "givenName": "R.G.", "surname": "Cantarella", "fullName": "R.G. Cantarella", "affiliation": "Burroughs Corporation, FSSG", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "1983-06-01 00:00:00", "pubType": "trans", "pages": "597-598", "year": "1983", "issn": "0018-9340", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ftcs/1991/2150/0/00146707", "title": "The t(n-1)-diagnosability and its applications to fault tolerance", "doi": null, "abstractUrl": "/proceedings-article/ftcs/1991/00146707/12OmNApLGoN", "parentPublication": { "id": "proceedings/ftcs/1991/2150/0", "title": "Digest of Papers. Fault-Tolerant Computing: The Twenty-First International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-icess/2009/3738/0/3738a384", "title": "N-Level Diskless Checkpointing", "doi": null, "abstractUrl": "/proceedings-article/hpcc-icess/2009/3738a384/12OmNBBzod3", "parentPublication": { "id": "proceedings/hpcc-icess/2009/3738/0", "title": "High Performance Computing and Communication &amp; IEEE International Conference on Embedded Software and Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/1995/2431/2/00480460", "title": "RLS design of polyphase components for the interpolation of periodically nonuniformly sampled signals", "doi": null, "abstractUrl": "/proceedings-article/icassp/1995/00480460/12OmNvlg8gL", "parentPublication": { "id": "proceedings/icassp/1995/2431/2", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2005/2482/0/24820161", "title": "An Experimental Evaluation on Reliability Features of N-Version Programming", "doi": null, "abstractUrl": "/proceedings-article/issre/2005/24820161/12OmNy4r3Sl", "parentPublication": { "id": "proceedings/issre/2005/2482/0", "title": "16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/1996/7707/0/77070308", "title": "A conservative theory for long term reliability growth prediction", "doi": null, "abstractUrl": "/proceedings-article/issre/1996/77070308/12OmNyQGSjh", "parentPublication": { "id": "proceedings/issre/1996/7707/0", "title": "Proceedings of ISSRE '96: 7th International Symposium on Software Reliability Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1985/11/01676541", "title": "Further Comments on \"The Reliability of Periodically Repaired n ?l/n Parallel Redundant Systems\"", "doi": null, "abstractUrl": "/journal/tc/1985/11/01676541/13rRUILtJkO", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2009/03/ttc2009030289", "title": "A Highly Accurate Method for Assessing Reliability of Redundant Arrays of Inexpensive Disks (RAID)", "doi": null, "abstractUrl": "/journal/tc/2009/03/ttc2009030289/13rRUwjXZRs", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1984/07/05009345", "title": "Comments on \"The Reliability of Periodically Repaired n - 1/n Parallel Redundant Systems", "doi": null, "abstractUrl": "/journal/tc/1984/07/05009345/13rRUxDqS7k", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2003/09/l0909", "title": "Early Stopping in Global Data Computation", "doi": null, "abstractUrl": "/journal/td/2003/09/l0909/13rRUytWF8P", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2020/5809/0/580900a528", "title": "Enhancing Reliability-Aware Speedup Modelling via Replication", "doi": null, "abstractUrl": "/proceedings-article/dsn/2020/580900a528/1lUFk4CAdTW", "parentPublication": { "id": "proceedings/dsn/2020/5809/0", "title": "2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "01676283", "articleId": "13rRUB7a101", "__typename": "AdjacentArticleType" }, "next": { "fno": "01676287", "articleId": "13rRUyYSWrx", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvGPE8n", "title": "Jan.", "year": "2016", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "22", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwfZBVp", "doi": "10.1109/TVCG.2015.2469115", "abstract": null, "abstracts": [], "normalizedAbstract": null, "title": "VAST Paper Reviewers", "normalizedTitle": "VAST Paper Reviewers", "fno": "07307920", "hasPdf": true, "idPrefix": "tg", "keywords": [], "authors": [], "replicability": null, "showBuyMe": false, "showRecommendedArticles": false, "isOpenAccess": true, "issueNum": "01", "pubDate": "2016-01-01 00:00:00", "pubType": "trans", "pages": "xxi-xxiv", "year": "2016", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "07307932", "articleId": "13rRUILtJmc", "__typename": "AdjacentArticleType" }, "next": { "fno": "07307923", "articleId": "13rRUwd9CG6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwFid7w", "title": "Jan.", "year": "2019", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "25", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45VTRouP", "doi": "10.1109/TVCG.2018.2874611", "abstract": "The publication offers a note of thanks and lists its reviewers.", "abstracts": [ { "abstractType": "Regular", "content": "The publication offers a note of thanks and lists its reviewers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The publication offers a note of thanks and lists its reviewers.", "title": "VAST Paper Reviewers", "normalizedTitle": "VAST Paper Reviewers", "fno": "08576488", "hasPdf": true, "idPrefix": "tg", "keywords": [], "authors": [], "replicability": null, "showBuyMe": false, "showRecommendedArticles": false, "isOpenAccess": true, "issueNum": "01", "pubDate": "2019-01-01 00:00:00", "pubType": "trans", "pages": "xxiv-xxiv", "year": "2019", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "08575978", "articleId": "17D45X0yjW6", "__typename": "AdjacentArticleType" }, "next": { "fno": "08570931", "articleId": "17D45Xtvp8D", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvsDHDY", "title": "Jan.", "year": "2020", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "26", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1fEi1L3JAGs", "doi": "10.1109/TVCG.2019.2935660", "abstract": "The conference offers a note of thanks and lists its reviewers.", "abstracts": [ { "abstractType": "Regular", "content": "The conference offers a note of thanks and lists its reviewers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The conference offers a note of thanks and lists its reviewers.", "title": "VAST Paper Reviewers", "normalizedTitle": "VAST Paper Reviewers", "fno": "08930148", "hasPdf": true, "idPrefix": "tg", "keywords": [], "authors": [], "replicability": null, "showBuyMe": false, "showRecommendedArticles": false, "isOpenAccess": true, "issueNum": "01", "pubDate": "2020-01-01 00:00:00", "pubType": "trans", "pages": "xxiv-xxv", "year": "2020", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "08915877", "articleId": "1fjdOpzhzos", "__typename": "AdjacentArticleType" }, "next": { "fno": "08930149", "articleId": "1fEi19otFzG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1qLcTGAzFjq", "doi": "10.1109/TVCG.2020.3033681", "abstract": "Presents a listing of the VAST conference reviewers.", "abstracts": [ { "abstractType": "Regular", "content": "Presents a listing of the VAST conference reviewers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presents a listing of the VAST conference reviewers.", "title": "VAST Reviewers", "normalizedTitle": "VAST Reviewers", "fno": "09340027", "hasPdf": true, "idPrefix": "tg", "keywords": [], "authors": [], "replicability": null, "showBuyMe": false, "showRecommendedArticles": false, "isOpenAccess": true, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "xxxviii-xxxix", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "09340025", "articleId": "1qLgcqtzkdi", "__typename": "AdjacentArticleType" }, "next": { "fno": "09340080", "articleId": "1qLgIjYnLHO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyPQ4uQ", "title": "Dec.", "year": "2018", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "24", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "14H4WOr0FCU", "doi": "10.1109/TVCG.2018.2790961", "abstract": "We propose Graph Thumbnails, small icon-like visualisations of the high-level structure of network data. Graph Thumbnails are designed to be legible in small multiples to support rapid browsing within large graph corpora. Compared to existing graph-visualisation techniques our representation has several advantages: (1) the visualisation can be computed in linear time; (2) it is canonical in the sense that isomorphic graphs will always have identical thumbnails; and (3) it provides precise information about the graph structure. We report the results of two user studies. The first study compares Graph Thumbnails to node-link and matrix views for identifying similar graphs. The second study investigates the comprehensibility of the different representations. We demonstrate the usefulness of this representation for summarising the evolution of protein-protein interaction networks across a range of species.", "abstracts": [ { "abstractType": "Regular", "content": "We propose Graph Thumbnails, small icon-like visualisations of the high-level structure of network data. Graph Thumbnails are designed to be legible in small multiples to support rapid browsing within large graph corpora. Compared to existing graph-visualisation techniques our representation has several advantages: (1) the visualisation can be computed in linear time; (2) it is canonical in the sense that isomorphic graphs will always have identical thumbnails; and (3) it provides precise information about the graph structure. We report the results of two user studies. The first study compares Graph Thumbnails to node-link and matrix views for identifying similar graphs. The second study investigates the comprehensibility of the different representations. We demonstrate the usefulness of this representation for summarising the evolution of protein-protein interaction networks across a range of species.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose Graph Thumbnails, small icon-like visualisations of the high-level structure of network data. Graph Thumbnails are designed to be legible in small multiples to support rapid browsing within large graph corpora. Compared to existing graph-visualisation techniques our representation has several advantages: (1) the visualisation can be computed in linear time; (2) it is canonical in the sense that isomorphic graphs will always have identical thumbnails; and (3) it provides precise information about the graph structure. We report the results of two user studies. The first study compares Graph Thumbnails to node-link and matrix views for identifying similar graphs. The second study investigates the comprehensibility of the different representations. We demonstrate the usefulness of this representation for summarising the evolution of protein-protein interaction networks across a range of species.", "title": "Graph Thumbnails: Identifying and Comparing Multiple Graphs at a Glance", "normalizedTitle": "Graph Thumbnails: Identifying and Comparing Multiple Graphs at a Glance", "fno": "08249874", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Visualization", "Layout", "Data Visualization", "Proteins", "Measurement", "Network Visualisation", "Circle Packing", "K Core Decomposition", "K Connected", "Network Identification", "Large Networks" ], "authors": [ { "givenName": "Vahan", "surname": "Yoghourdjian", "fullName": "Vahan Yoghourdjian", "affiliation": "Monash University, Clayton, Victoria, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Tim", "surname": "Dwyer", "fullName": "Tim Dwyer", "affiliation": "Monash University, Clayton, Victoria, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Karsten", "surname": "Klein", "fullName": "Karsten Klein", "affiliation": "University of Konstanz, Konstanz, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Kim", "surname": "Marriott", "fullName": "Kim Marriott", "affiliation": "Monash University, Clayton, Victoria, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Michael", "surname": "Wybrow", "fullName": "Michael Wybrow", "affiliation": "Monash University, Clayton, Victoria, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2018-12-01 00:00:00", "pubType": "trans", "pages": "3081-3095", "year": "2018", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/e-science/2017/2686/0/08109154", "title": "Iterative Design and Evaluation of Regulatory Network Visualisation at Scale", "doi": null, "abstractUrl": "/proceedings-article/e-science/2017/08109154/12OmNB8Cj01", "parentPublication": { "id": "proceedings/e-science/2017/2686/0", "title": "2017 IEEE 13th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2014/5721/0/06974818", "title": "Protein Data Modelling for Concurrent Sequential Patterns", "doi": null, "abstractUrl": "/proceedings-article/dexa/2014/06974818/12OmNroijeS", "parentPublication": { "id": "proceedings/dexa/2014/5721/0", "title": "2014 25th International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2012/2027/0/06266442", "title": "A Visual Search User Study on the Influences of Aspect Ratio Distortion of Preview Thumbnails", "doi": null, "abstractUrl": "/proceedings-article/icmew/2012/06266442/12OmNx4gUkE", "parentPublication": { "id": "proceedings/icmew/2012/2027/0", "title": "2012 IEEE International Conference on Multimedia & Expo Workshops (ICMEW 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2014/4717/0/06890710", "title": "An image community detection method for hierarchical visualisation", "doi": null, "abstractUrl": "/proceedings-article/icmew/2014/06890710/12OmNxj23dE", "parentPublication": { "id": "proceedings/icmew/2014/4717/0", "title": "2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568a148", "title": "Plot Balalaika: Simple Chart Designs for Long-Tail Distributed Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a148/12OmNzBOi4c", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822594", "title": "Identifying protein complexes via multi-network clustering", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822594/12OmNzsJ7AU", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/02/ttk2013020325", "title": "Clustering Large Probabilistic Graphs", "doi": null, "abstractUrl": "/journal/tk/2013/02/ttk2013020325/13rRUIM2VHm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a471", "title": "MixMash: A Visualisation System for Musical Mashup Creation", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a471/17D45XvMcd9", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933773", "title": "Thumbnails for Data Stories: A Survey of Current Practices", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933773/1fTgFlSnH8s", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090531", "title": "Immersive sonification of protein surface", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090531/1jIxzEw3bb2", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08123949", "articleId": "14H4WNoi7Yc", "__typename": "AdjacentArticleType" }, "next": { "fno": "08239850", "articleId": "14H4WN2IC5i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1E5LzxMmqK4", "doi": "10.1109/TKDE.2022.3176650", "abstract": "Modern intelligent transportation system (ITS) has greatly benefitted people&#x0027;s daily life. However, the chanciness and suddenness of urban anomalies may greatly restrict the trouble-free operations of ITS. To be aware of future urban anomalies and their possible influences, great efforts have been achieved on these two aspects, but comprehensive predictions of urban anomalies including the predictions of distributions and durations, are still beingless. And the spatiotemporal cascade self/mutual exciting influences among anomalies have never been considered in previous studies. In this paper, we propose a novel Anomaly Distribution and Duration Joint-Prediction (A2DJP) algorithm to simultaneously filtrate urban subregions and estimate the durations of corresponding potential anomalies in the future. To capture the spatiotemporal correlations between urban traffics and anomalies, we use a modified Graph Convolution Network and Long Short-Term Memory integrated network. To learn the cascade correlations among anomalies themselves, we devise a novel Spatiotemporal neural Hawkes Process model, which contains a Hawkes Process (HP) based GCN and HP-based LSTM to extract the anomaly-wise spatiotemporal cascading correlations. By fusing the spatiotemporal correlations between traffics and anomalies, we then simultaneously predict the distributions and durations of future anomalies. Extensive experiments on real-world datasets demonstrate that our proposed method significantly outperforms the state-of-the-art solutions.", "abstracts": [ { "abstractType": "Regular", "content": "Modern intelligent transportation system (ITS) has greatly benefitted people&#x0027;s daily life. However, the chanciness and suddenness of urban anomalies may greatly restrict the trouble-free operations of ITS. To be aware of future urban anomalies and their possible influences, great efforts have been achieved on these two aspects, but comprehensive predictions of urban anomalies including the predictions of distributions and durations, are still beingless. And the spatiotemporal cascade self/mutual exciting influences among anomalies have never been considered in previous studies. In this paper, we propose a novel Anomaly Distribution and Duration Joint-Prediction (A2DJP) algorithm to simultaneously filtrate urban subregions and estimate the durations of corresponding potential anomalies in the future. To capture the spatiotemporal correlations between urban traffics and anomalies, we use a modified Graph Convolution Network and Long Short-Term Memory integrated network. To learn the cascade correlations among anomalies themselves, we devise a novel Spatiotemporal neural Hawkes Process model, which contains a Hawkes Process (HP) based GCN and HP-based LSTM to extract the anomaly-wise spatiotemporal cascading correlations. By fusing the spatiotemporal correlations between traffics and anomalies, we then simultaneously predict the distributions and durations of future anomalies. Extensive experiments on real-world datasets demonstrate that our proposed method significantly outperforms the state-of-the-art solutions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Modern intelligent transportation system (ITS) has greatly benefitted people's daily life. However, the chanciness and suddenness of urban anomalies may greatly restrict the trouble-free operations of ITS. To be aware of future urban anomalies and their possible influences, great efforts have been achieved on these two aspects, but comprehensive predictions of urban anomalies including the predictions of distributions and durations, are still beingless. And the spatiotemporal cascade self/mutual exciting influences among anomalies have never been considered in previous studies. In this paper, we propose a novel Anomaly Distribution and Duration Joint-Prediction (A2DJP) algorithm to simultaneously filtrate urban subregions and estimate the durations of corresponding potential anomalies in the future. To capture the spatiotemporal correlations between urban traffics and anomalies, we use a modified Graph Convolution Network and Long Short-Term Memory integrated network. To learn the cascade correlations among anomalies themselves, we devise a novel Spatiotemporal neural Hawkes Process model, which contains a Hawkes Process (HP) based GCN and HP-based LSTM to extract the anomaly-wise spatiotemporal cascading correlations. By fusing the spatiotemporal correlations between traffics and anomalies, we then simultaneously predict the distributions and durations of future anomalies. Extensive experiments on real-world datasets demonstrate that our proposed method significantly outperforms the state-of-the-art solutions.", "title": "A2DJP: A Two Graph-based Component Fused Learning Framework for Urban Anomaly Distribution and Duration Joint-Prediction", "normalizedTitle": "A2DJP: A Two Graph-based Component Fused Learning Framework for Urban Anomaly Distribution and Duration Joint-Prediction", "fno": "09793649", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Correlation", "Spatiotemporal Phenomena", "Roads", "Accidents", "Predictive Models", "Urban Areas", "Pipelines", "Hawkes Process", "Spatiotemporal Cascading Correlations", "Anomaly Prediction", "Anomaly Duration Prediction" ], "authors": [ { "givenName": "Kun", "surname": "Wang", "fullName": "Kun Wang", "affiliation": "School of Software Enginnering, University of Science and Technology of China, 12652 Hefei, Anhui, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhengyang", "surname": "Zhou", "fullName": "Zhengyang Zhou", "affiliation": "School of Computer Science, University of Science and Technology of China, 12652 Hefei, Anhui, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xu", "surname": "Wang", "fullName": "Xu Wang", "affiliation": "School of Software, University of Science and Technology of China, 12652 Hefei, Anhui, China", "__typename": "ArticleAuthorType" }, { "givenName": "Pengkun", "surname": "Wang", "fullName": "Pengkun Wang", "affiliation": "School of Data Science, University of Science and Technology of China, 12652 Hefei, Anhui, China", "__typename": "ArticleAuthorType" }, { "givenName": "Qi", "surname": "Fang", "fullName": "Qi Fang", "affiliation": "College of Computer Science and Technology, Haerbin Engineering University, 12428 Harbin, Heilongjiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yang", "surname": "Wang", "fullName": "Yang Wang", "affiliation": "School of software engineering, University of Science and Technology of China, 12652 Hefei, Anhui, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-06-01 00:00:00", "pubType": "trans", "pages": "1-1", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/ai/2023/02/09721618", "title": "High-Resolution Urban Flows Forecasting With Coarse-Grained Spatiotemporal Data", "doi": null, "abstractUrl": "/journal/ai/2023/02/09721618/1BhzGsasS3K", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09851618", "title": "Spatiotemporal Urban Inference and Prediction in Sparse Mobile CrowdSensing: a Graph Neural Network Approach", "doi": null, "abstractUrl": "/journal/tm/5555/01/09851618/1FAIuhcMRLG", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09837455", "title": "CityNeuro: Towards Location and Time Prediction for Urban Abnormal Events", "doi": null, "abstractUrl": "/journal/tk/5555/01/09837455/1FdICjrjPgs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904453", "title": "A Comparison of Spatiotemporal Visualizations for 3D Urban Analytics", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904453/1H1giUQajSM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09944966", "title": "Traffic Flow Prediction Based on Spatiotemporal Potential Energy Fields", "doi": null, "abstractUrl": "/journal/tk/5555/01/09944966/1IbM9Dh1cuA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005461", "title": "USTAR: Online Multimodal Embedding for Modeling User-Guided Spatiotemporal Activity", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005461/1hJsp5wouDS", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2022/03/09080109", "title": "Urban Anomaly Analytics: Description, Detection, and Prediction", "doi": null, "abstractUrl": "/journal/bd/2022/03/09080109/1jozXyy1Rxm", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/08/09242313", "title": "Foresee Urban Sparse Traffic Accidents: A Spatiotemporal Multi-Granularity Perspective", "doi": null, "abstractUrl": "/journal/tk/2022/08/09242313/1oijolExBNS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2021/2845/0/284500a039", "title": "Urban Crowd Density Prediction Based on Multi-relational Graph", "doi": null, "abstractUrl": "/proceedings-article/mdm/2021/284500a039/1v2QxX1aeSk", "parentPublication": { "id": "proceedings/mdm/2021/2845/0", "title": "2021 22nd IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900d988", "title": "Practices and A Strong Baseline for Traffic Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900d988/1yVzPmeDhaE", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09792280", "articleId": "1E5LznqznEc", "__typename": "AdjacentArticleType" }, "next": { "fno": "09793708", "articleId": "1E5LzI2tveE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBpEeNH", "title": "Jan.", "year": "2015", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "21", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUEgarnL", "doi": "10.1109/TVCG.2014.2337333", "abstract": "Movement data sets collected using today’s advanced tracking devices consist of complex trajectories in terms of length, shape, and number of recorded positions. Multiple additional attributes characterizing the movement and its environment are often also included making the level of complexity even higher. Simplification of trajectories can improve the visibility of relevant information by reducing less relevant details while maintaining important movement patterns. We propose a systematic stepwise methodology for simplifying and thematically enhancing trajectories in order to support their visual analysis. The methodology is applied iteratively and is composed of: (a) a simplification step applied to reduce the morphological complexity of the trajectories, (b) a thematic enhancement step which aims at accentuating patterns of movement, and (c) the representation and interactive exploration of the results in order to make interpretations of the findings and further refinement to the simplification and enhancement process. We illustrate our methodology through an analysis example of two different types of tracks, aircraft and pedestrian movement.", "abstracts": [ { "abstractType": "Regular", "content": "Movement data sets collected using today’s advanced tracking devices consist of complex trajectories in terms of length, shape, and number of recorded positions. Multiple additional attributes characterizing the movement and its environment are often also included making the level of complexity even higher. Simplification of trajectories can improve the visibility of relevant information by reducing less relevant details while maintaining important movement patterns. We propose a systematic stepwise methodology for simplifying and thematically enhancing trajectories in order to support their visual analysis. The methodology is applied iteratively and is composed of: (a) a simplification step applied to reduce the morphological complexity of the trajectories, (b) a thematic enhancement step which aims at accentuating patterns of movement, and (c) the representation and interactive exploration of the results in order to make interpretations of the findings and further refinement to the simplification and enhancement process. We illustrate our methodology through an analysis example of two different types of tracks, aircraft and pedestrian movement.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Movement data sets collected using today’s advanced tracking devices consist of complex trajectories in terms of length, shape, and number of recorded positions. Multiple additional attributes characterizing the movement and its environment are often also included making the level of complexity even higher. Simplification of trajectories can improve the visibility of relevant information by reducing less relevant details while maintaining important movement patterns. We propose a systematic stepwise methodology for simplifying and thematically enhancing trajectories in order to support their visual analysis. The methodology is applied iteratively and is composed of: (a) a simplification step applied to reduce the morphological complexity of the trajectories, (b) a thematic enhancement step which aims at accentuating patterns of movement, and (c) the representation and interactive exploration of the results in order to make interpretations of the findings and further refinement to the simplification and enhancement process. We illustrate our methodology through an analysis example of two different types of tracks, aircraft and pedestrian movement.", "title": "SimpliFly: A Methodology for Simplification and Thematic Enhancement of Trajectories", "normalizedTitle": "SimpliFly: A Methodology for Simplification and Thematic Enhancement of Trajectories", "fno": "06851202", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Trajectory", "Context", "Visualization", "Shape", "Three Dimensional Displays", "Ocean Temperature", "Satellite Broadcasting", "Clustering", "Visual Analysis", "Trajectories", "Simplification", "Thematic Enhancement" ], "authors": [ { "givenName": "Katerina", "surname": "Vrotsou", "fullName": "Katerina Vrotsou", "affiliation": ", Linköping University, Sweden", "__typename": "ArticleAuthorType" }, { "givenName": "Halldor", "surname": "Janetzko", "fullName": "Halldor Janetzko", "affiliation": ", University of Konstanz, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Carlo", "surname": "Navarra", "fullName": "Carlo Navarra", "affiliation": ", Linköping University, Sweden", "__typename": "ArticleAuthorType" }, { "givenName": "Georg", "surname": "Fuchs", "fullName": "Georg Fuchs", "affiliation": ", University of Bonn and Fraunhofer IAIS, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "David", "surname": "Spretke", "fullName": "David Spretke", "affiliation": ", University of Konstanz, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Florian", "surname": "Mansmann", "fullName": "Florian Mansmann", "affiliation": ", University of Konstanz, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Natalia", "surname": "Andrienko", "fullName": "Natalia Andrienko", "affiliation": ", University of Bonn and Fraunhofer IAIS, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Gennady", "surname": "Andrienko", "fullName": "Gennady Andrienko", "affiliation": ", University of Bonn and Fraunhofer IAIS, Germany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2015-01-01 00:00:00", "pubType": "trans", "pages": "107-121", "year": "2015", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/mdm/2014/5705/1/5705a341", "title": "Hybrid Queries over Symbolic and Spatial Trajectories: A Usage Scenario", "doi": null, "abstractUrl": "/proceedings-article/mdm/2014/5705a341/12OmNAYGlvh", "parentPublication": { "id": "proceedings/mdm/2014/5705/2", "title": "2014 15th IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/2012/4656/0/4656a062", "title": "Compression of GPS Trajectories", "doi": null, "abstractUrl": "/proceedings-article/dcc/2012/4656a062/12OmNBDyA9C", "parentPublication": { "id": "proceedings/dcc/2012/4656/0", "title": "Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2017/3932/0/07962435", "title": "An Efficient Online Approach for Direction-Preserving Trajectory Simplification with Interval Bounds", "doi": null, "abstractUrl": "/proceedings-article/mdm/2017/07962435/12OmNBSBkgw", "parentPublication": { "id": "proceedings/mdm/2017/3932/0", "title": "2017 18th IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156362", "title": "Analyzing delays in trajectories", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156362/12OmNylsZUZ", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2014/5705/1/5705a353", "title": "RouteMiner: Mining Ship Routes from a Massive Maritime Trajectories", "doi": null, "abstractUrl": "/proceedings-article/mdm/2014/5705a353/12OmNzvQHMH", "parentPublication": { "id": "proceedings/mdm/2014/5705/2", "title": "2014 15th IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258021", "title": "Event-based non-parametric clustering of team sport trajectories", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258021/17D45Vu1TxM", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2019/9226/0/922600a174", "title": "Visual Analytics of Taxi Trajectory Data via Topical Sub-trajectories", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2019/922600a174/1cMF7meccAo", "parentPublication": { "id": "proceedings/pacificvis/2019/9226/0", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2019/2717/0/271700a001", "title": "P-STM: Privacy-Protected Social Tie Mining of Individual Trajectories", "doi": null, "abstractUrl": "/proceedings-article/icws/2019/271700a001/1cTJqour5bW", "parentPublication": { "id": "proceedings/icws/2019/2717/0", "title": "2019 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2021/9184/0/918400a684", "title": "Trajectory Simplification with Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/icde/2021/918400a684/1uGXmCDwsk8", "parentPublication": { "id": "proceedings/icde/2021/9184/0", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2021/2845/0/284500a157", "title": "Improving persistence based trajectory simplification", "doi": null, "abstractUrl": "/proceedings-article/mdm/2021/284500a157/1v2QC9lSUcU", "parentPublication": { "id": "proceedings/mdm/2021/2845/0", "title": "2021 22nd IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06846311", "articleId": "13rRUEgs2BY", "__typename": "AdjacentArticleType" }, "next": { "fno": "06826569", "articleId": "13rRUyYjKah", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyjLoQq", "title": "Oct.", "year": "2014", "issueNum": "10", "idPrefix": "tk", "pubType": "journal", "volume": "26", "label": "Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxlgxTQ", "doi": "10.1109/TKDE.2013.104", "abstract": "Clustering categorical sequences is an important and difficult data mining task. Despite recent efforts, the challenge remains, due to the lack of an inherently meaningful measure of pairwise similarity. In this paper, we propose a novel variable-order Markov framework, named weighted conditional probability distribution (WCPD), to model clusters of categorical sequences. We propose an efficient and effective approach to solve the challenging problem of model initialization. To initialize the WCPD model, we propose to use a first-order Markov model built on a weighted fuzzy indicator vector representation of categorical sequences, which we call the WFI Markov model. Based on a cascade optimization framework that combines the WCPD and WFI models, we design a new divisive hierarchical clustering algorithm for clustering categorical sequences. Experimental results on data sets from three different domains demonstrate the promising performance of our models and clustering algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "Clustering categorical sequences is an important and difficult data mining task. Despite recent efforts, the challenge remains, due to the lack of an inherently meaningful measure of pairwise similarity. In this paper, we propose a novel variable-order Markov framework, named weighted conditional probability distribution (WCPD), to model clusters of categorical sequences. We propose an efficient and effective approach to solve the challenging problem of model initialization. To initialize the WCPD model, we propose to use a first-order Markov model built on a weighted fuzzy indicator vector representation of categorical sequences, which we call the WFI Markov model. Based on a cascade optimization framework that combines the WCPD and WFI models, we design a new divisive hierarchical clustering algorithm for clustering categorical sequences. Experimental results on data sets from three different domains demonstrate the promising performance of our models and clustering algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Clustering categorical sequences is an important and difficult data mining task. Despite recent efforts, the challenge remains, due to the lack of an inherently meaningful measure of pairwise similarity. In this paper, we propose a novel variable-order Markov framework, named weighted conditional probability distribution (WCPD), to model clusters of categorical sequences. We propose an efficient and effective approach to solve the challenging problem of model initialization. To initialize the WCPD model, we propose to use a first-order Markov model built on a weighted fuzzy indicator vector representation of categorical sequences, which we call the WFI Markov model. Based on a cascade optimization framework that combines the WCPD and WFI models, we design a new divisive hierarchical clustering algorithm for clustering categorical sequences. Experimental results on data sets from three different domains demonstrate the promising performance of our models and clustering algorithm.", "title": "A Novel Variable-order Markov Model for Clustering Categorical Sequences", "normalizedTitle": "A Novel Variable-order Markov Model for Clustering Categorical Sequences", "fno": "06547142", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Pattern Clustering", "Data Mining", "Fuzzy Set Theory", "Markov Processes", "Optimisation", "Clustering Algorithm", "Novel Variable Order Markov Model", "Clustering Categorical Sequences", "Data Mining", "Weighted Conditional Probability Distribution", "WCPD", "Weighted Fuzzy Indicator Vector Representation", "WFI Markov Model", "Cascade Optimization Framework", "Hidden Markov Models", "Markov Processes", "Data Models", "Silicon", "Probability", "Clustering Algorithms", "Numerical Models", "Clustering", "Information Technology And Systems", "Database Management", "Database Applications", "Data Mining", "Computing Methodologies", "Pattern Recognition", "Models", "Statistical", "Similarity Measure", "Statistical Model", "Categorical Sequence", "Clustering" ], "authors": [ { "givenName": "Tengke Xiong", "surname": "Society", "fullName": "Tengke Xiong Society", "affiliation": "Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shengrui", "surname": "Wang", "fullName": "Shengrui Wang", "affiliation": "Department of Computer Science, University of Sherbrooke, Sherbrooke, QC, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "Qingshan", "surname": "Jiang", "fullName": "Qingshan Jiang", "affiliation": "Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Joshua Zhexue", "surname": "Huang", "fullName": "Joshua Zhexue Huang", "affiliation": "College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "10", "pubDate": "2014-10-01 00:00:00", "pubType": "trans", "pages": "2339-2353", "year": "2014", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hicss/1993/3230/1/00270611", "title": "Protein modeling using hidden Markov models: analysis of globins", "doi": null, "abstractUrl": "/proceedings-article/hicss/1993/00270611/12OmNApu5it", "parentPublication": { "id": "proceedings/hicss/1993/3230/1", "title": "1993 The Twenty-sixth Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1994/6270/2/00576891", "title": "Hidden Markov models for labeled sequences", "doi": null, "abstractUrl": "/proceedings-article/icpr/1994/00576891/12OmNC8MssT", "parentPublication": { "id": "proceedings/icpr/1994/6270/2", "title": "Proceedings of 12th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2015/9504/0/9504a931", "title": "Two-Step Heterogeneous Finite Mixture Model Clustering for Mining Healthcare Databases", "doi": null, "abstractUrl": "/proceedings-article/icdm/2015/9504a931/12OmNCgJeam", "parentPublication": { "id": "proceedings/icdm/2015/9504/0", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ialp/2012/4886/0/4886a117", "title": "Mongolian Morphological Segmentation with Hidden Markov Model", "doi": null, "abstractUrl": "/proceedings-article/ialp/2012/4886a117/12OmNwcCIP4", "parentPublication": { "id": "proceedings/ialp/2012/4886/0", "title": "Asian Language Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vspets/2005/9424/0/01570922", "title": "Efficient Hidden Semi-Markov Model Inference for Structured Video Sequences", "doi": null, "abstractUrl": "/proceedings-article/vspets/2005/01570922/12OmNwvVrN6", "parentPublication": { "id": "proceedings/vspets/2005/9424/0", "title": "Proceedings. 2nd Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance (VS-PETS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408a854", "title": "A New Markov Model for Clustering Categorical Sequences", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408a854/12OmNxFJXPI", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/06977435", "title": "Automatic Segmentation and Recognition of Human Actions in Monocular Sequences", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/06977435/12OmNz5JCgY", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2013/09/ttd2013091807", "title": "Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration", "doi": null, "abstractUrl": "/journal/td/2013/09/ttd2013091807/13rRUIJuxpb", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1977/05/01674861", "title": "Fast Suboptimal Wiener Filtering of Markov Sequences", "doi": null, "abstractUrl": "/journal/tc/1977/05/01674861/13rRUx0xPgX", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2015/04/mmu2015040052", "title": "The Variable Markov Oracle: Algorithms for Human Gesture Applications", "doi": null, "abstractUrl": "/magazine/mu/2015/04/mmu2015040052/13rRUy0qnD3", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": null, "next": { "fno": "06517849", "articleId": "13rRUxDqS8M", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvjgWM4", "title": "Nov.", "year": "2018", "issueNum": "11", "idPrefix": "tp", "pubType": "journal", "volume": "40", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "143fgZJUyze", "doi": "10.1109/TPAMI.2017.2766142", "abstract": "Deep generative models (DGMs) can effectively capture the underlying distributions of complex data by learning multilayered representations and performing inference. However, it is relatively insufficient to boost the discriminative ability of DGMs. This paper presents max-margin deep generative models (mmDGMs) and a class-conditional variant (mmDCGMs), which explore the strongly discriminative principle of max-margin learning to improve the predictive performance of DGMs in both supervised and semi-supervised learning, while retaining the generative capability. In semi-supervised learning, we use the predictions of a max-margin classifier as the missing labels instead of performing full posterior inference for efficiency; we also introduce additional max-margin and label-balance regularization terms of unlabeled data for effectiveness. We develop an efficient doubly stochastic subgradient algorithm for the piecewise linear objectives in different settings. Empirical results on various datasets demonstrate that: (1) max-margin learning can significantly improve the prediction performance of DGMs and meanwhile retain the generative ability; (2) in supervised learning, mmDGMs are competitive to the best fully discriminative networks when employing convolutional neural networks as the generative and recognition models; and (3) in semi-supervised learning, mmDCGMs can perform efficient inference and achieve state-of-the-art classification results on several benchmarks.", "abstracts": [ { "abstractType": "Regular", "content": "Deep generative models (DGMs) can effectively capture the underlying distributions of complex data by learning multilayered representations and performing inference. However, it is relatively insufficient to boost the discriminative ability of DGMs. This paper presents max-margin deep generative models (mmDGMs) and a class-conditional variant (mmDCGMs), which explore the strongly discriminative principle of max-margin learning to improve the predictive performance of DGMs in both supervised and semi-supervised learning, while retaining the generative capability. In semi-supervised learning, we use the predictions of a max-margin classifier as the missing labels instead of performing full posterior inference for efficiency; we also introduce additional max-margin and label-balance regularization terms of unlabeled data for effectiveness. We develop an efficient doubly stochastic subgradient algorithm for the piecewise linear objectives in different settings. Empirical results on various datasets demonstrate that: (1) max-margin learning can significantly improve the prediction performance of DGMs and meanwhile retain the generative ability; (2) in supervised learning, mmDGMs are competitive to the best fully discriminative networks when employing convolutional neural networks as the generative and recognition models; and (3) in semi-supervised learning, mmDCGMs can perform efficient inference and achieve state-of-the-art classification results on several benchmarks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep generative models (DGMs) can effectively capture the underlying distributions of complex data by learning multilayered representations and performing inference. However, it is relatively insufficient to boost the discriminative ability of DGMs. This paper presents max-margin deep generative models (mmDGMs) and a class-conditional variant (mmDCGMs), which explore the strongly discriminative principle of max-margin learning to improve the predictive performance of DGMs in both supervised and semi-supervised learning, while retaining the generative capability. In semi-supervised learning, we use the predictions of a max-margin classifier as the missing labels instead of performing full posterior inference for efficiency; we also introduce additional max-margin and label-balance regularization terms of unlabeled data for effectiveness. We develop an efficient doubly stochastic subgradient algorithm for the piecewise linear objectives in different settings. Empirical results on various datasets demonstrate that: (1) max-margin learning can significantly improve the prediction performance of DGMs and meanwhile retain the generative ability; (2) in supervised learning, mmDGMs are competitive to the best fully discriminative networks when employing convolutional neural networks as the generative and recognition models; and (3) in semi-supervised learning, mmDCGMs can perform efficient inference and achieve state-of-the-art classification results on several benchmarks.", "title": "Max-Margin Deep Generative Models for (Semi-)Supervised Learning", "normalizedTitle": "Max-Margin Deep Generative Models for (Semi-)Supervised Learning", "fno": "08081757", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Data Models", "Semisupervised Learning", "Predictive Models", "Supervised Learning", "Gallium Nitride", "Markov Random Fields", "Deep Generative Models", "Max Margin Learning", "Variational Inference", "Supervised And Semi Supervised Learning" ], "authors": [ { "givenName": "Chongxuan", "surname": "Li", "fullName": "Chongxuan Li", "affiliation": "Department of Computer Science and Technology, TNList Lab, State Key Lab for Intelligent Technology and Systems, Center for Bio-Inspired Computing Research, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jun", "surname": "Zhu", "fullName": "Jun Zhu", "affiliation": "Department of Computer Science and Technology, TNList Lab, State Key Lab for Intelligent Technology and Systems, Center for Bio-Inspired Computing Research, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Bo", "surname": "Zhang", "fullName": "Bo Zhang", "affiliation": "Department of Computer Science and Technology, TNList Lab, State Key Lab for Intelligent Technology and Systems, Center for Bio-Inspired Computing Research, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2018-11-01 00:00:00", "pubType": "trans", "pages": "2762-2775", "year": "2018", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2017/1034/0/1034b156", "title": "Max-Boost-GAN: Max Operation to Boost Generative Ability of Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034b156/12OmNARRYfl", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2016/5473/0/07837920", "title": "A Semi-Supervised AUC Optimization Method with Generative Models", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837920/12OmNAoUT2j", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2015/8676/0/07968108", "title": "Incremental max-margin learning for semi-supervised multi-class problem", "doi": null, "abstractUrl": "/proceedings-article/snpd/2015/07968108/12OmNySosOA", "parentPublication": { "id": "proceedings/snpd/2015/8676/0", "title": "2015 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032f689", "title": "Semi Supervised Semantic Segmentation Using Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032f689/12OmNyv7maE", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/08/07453170", "title": "Incremental and Decremental Max-Flow for Online Semi-Supervised Learning", "doi": null, "abstractUrl": "/journal/tk/2016/08/07453170/13rRUNvgyWV", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/6.946E161", "title": "Towards Semi-Supervised Deep Facial Expression Recognition with An Adaptive Confidence Margin", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/6.946E161/1H1jUbtebCw", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/04/08935407", "title": "Semi-Supervised Semantic Segmentation With High- and Low-Level Consistency", "doi": null, "abstractUrl": "/journal/tp/2021/04/08935407/1fPUdaDDrm8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800f719", "title": "Regularizing Discriminative Capability of CGANs for Semi-Supervised Generative Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800f719/1m3nZwtT3JS", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2020/9274/0/927400a264", "title": "A comparison of graph-based semi-supervised learning for data augmentation", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2020/927400a264/1p2VzPk0reg", "parentPublication": { "id": "proceedings/sibgrapi/2020/9274/0", "title": "2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412739", "title": "Generative Deep-Neural-Network Mixture Modeling with Semi-Supervised MinMax+EM Learning", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412739/1tmiGNLh8JO", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08103030", "articleId": "143fgZGvn0s", "__typename": "AdjacentArticleType" }, "next": { "fno": "08094018", "articleId": "143fgZYFHkB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTYet3h", "name": "ttp201811-08081757s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttp201811-08081757s1.zip", "extension": "zip", "size": "1.14 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nMMmribStW", "doi": "10.1109/TVCG.2020.3028888", "abstract": "Many statistical learning models hold an assumption that the training data and the future unlabeled data are drawn from the same distribution. However, this assumption is difficult to fulfill in real-world scenarios and creates barriers in reusing existing labels from similar application domains. Transfer Learning is intended to relax this assumption by modeling relationships between domains, and is often applied in deep learning applications to reduce the demand for labeled data and training time. Despite recent advances in exploring deep learning models with visual analytics tools, little work has explored the issue of explaining and diagnosing the knowledge transfer process between deep learning models. In this paper, we present a visual analytics framework for the multi-level exploration of the transfer learning processes when training deep neural networks. Our framework establishes a multi-aspect design to explain how the learned knowledge from the existing model is transferred into the new learning task when training deep neural networks. Based on a comprehensive requirement and task analysis, we employ descriptive visualization with performance measures and detailed inspections of model behaviors from the statistical, instance, feature, and model structure levels. We demonstrate our framework through two case studies on image classification by fine-tuning AlexNets to illustrate how analysts can utilize our framework.", "abstracts": [ { "abstractType": "Regular", "content": "Many statistical learning models hold an assumption that the training data and the future unlabeled data are drawn from the same distribution. However, this assumption is difficult to fulfill in real-world scenarios and creates barriers in reusing existing labels from similar application domains. Transfer Learning is intended to relax this assumption by modeling relationships between domains, and is often applied in deep learning applications to reduce the demand for labeled data and training time. Despite recent advances in exploring deep learning models with visual analytics tools, little work has explored the issue of explaining and diagnosing the knowledge transfer process between deep learning models. In this paper, we present a visual analytics framework for the multi-level exploration of the transfer learning processes when training deep neural networks. Our framework establishes a multi-aspect design to explain how the learned knowledge from the existing model is transferred into the new learning task when training deep neural networks. Based on a comprehensive requirement and task analysis, we employ descriptive visualization with performance measures and detailed inspections of model behaviors from the statistical, instance, feature, and model structure levels. We demonstrate our framework through two case studies on image classification by fine-tuning AlexNets to illustrate how analysts can utilize our framework.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many statistical learning models hold an assumption that the training data and the future unlabeled data are drawn from the same distribution. However, this assumption is difficult to fulfill in real-world scenarios and creates barriers in reusing existing labels from similar application domains. Transfer Learning is intended to relax this assumption by modeling relationships between domains, and is often applied in deep learning applications to reduce the demand for labeled data and training time. Despite recent advances in exploring deep learning models with visual analytics tools, little work has explored the issue of explaining and diagnosing the knowledge transfer process between deep learning models. In this paper, we present a visual analytics framework for the multi-level exploration of the transfer learning processes when training deep neural networks. Our framework establishes a multi-aspect design to explain how the learned knowledge from the existing model is transferred into the new learning task when training deep neural networks. Based on a comprehensive requirement and task analysis, we employ descriptive visualization with performance measures and detailed inspections of model behaviors from the statistical, instance, feature, and model structure levels. We demonstrate our framework through two case studies on image classification by fine-tuning AlexNets to illustrate how analysts can utilize our framework.", "title": "A Visual Analytics Framework for Explaining and Diagnosing Transfer Learning Processes", "normalizedTitle": "A Visual Analytics Framework for Explaining and Diagnosing Transfer Learning Processes", "fno": "09219240", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Visualisation", "Image Classification", "Learning Artificial Intelligence", "Neural Nets", "Pattern Classification", "Task Analysis", "Learning Task", "Deep Neural Networks", "Descriptive Visualization", "Model Behaviors", "Model Structure Levels", "Visual Analytics Framework", "Statistical Learning Models", "Training Data", "Future Unlabeled Data", "Similar Application Domains", "Transfer Learning", "Deep Learning Applications", "Training Time", "Deep Learning Models", "Visual Analytics Tools", "Knowledge Transfer Process", "Multilevel Exploration", "Learned Knowledge", "Alex Nets", "Analytical Models", "Visual Analytics", "Task Analysis", "Deep Learning", "Data Models", "Neurons", "Predictive Models", "Transfer Learning", "Deep Learning", "Visual Analytics" ], "authors": [ { "givenName": "Yuxin", "surname": "Ma", "fullName": "Yuxin Ma", "affiliation": "Arizona State University", "__typename": "ArticleAuthorType" }, { "givenName": "Arlen", "surname": "Fan", "fullName": "Arlen Fan", "affiliation": "Arizona State University", "__typename": "ArticleAuthorType" }, { "givenName": "Jingrui", "surname": "He", "fullName": "Jingrui He", "affiliation": "University of Illinois at Urbana-Champaign", "__typename": "ArticleAuthorType" }, { "givenName": "Arun Reddy", "surname": "Nelakurthi", "fullName": "Arun Reddy Nelakurthi", "affiliation": "Samsung Research America", "__typename": "ArticleAuthorType" }, { "givenName": "Ross", "surname": "Maciejewski", "fullName": "Ross Maciejewski", "affiliation": "Arizona State University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "1385-1395", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tg/2018/06/08320546", "title": "GANViz: A Visual Analytics Approach to Understand the Adversarial Game", "doi": null, "abstractUrl": "/journal/tg/2018/06/08320546/13rRUEgs2tu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019879", "title": "Analyzing the Training Processes of Deep Generative Models", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019879/13rRUxAATgA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2018/9264/0/926400a384", "title": "Delaunay Triangulation Data Augmentation Guided by Visual Analytics for Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2018/926400a384/17D45X0yjU7", "parentPublication": { "id": "proceedings/sibgrapi/2018/9264/0", "title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a367", "title": "Instance-Based Deep Transfer Learning", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a367/18j8NOvlRIY", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdicn/2022/8476/0/847600a335", "title": "Towards Accelerated and Robust Rreinforcement Learning with Transfer Learning", "doi": null, "abstractUrl": "/proceedings-article/bdicn/2022/847600a335/1CJgstsaFiM", "parentPublication": { "id": "proceedings/bdicn/2022/8476/0", "title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cps-er/2022/7036/0/703600a013", "title": "A 360-Degree Video Analytics Service for In-Classroom Firefighter Training", "doi": null, "abstractUrl": "/proceedings-article/cps-er/2022/703600a013/1EzI5zfbple", "parentPublication": { "id": "proceedings/cps-er/2022/7036/0", "title": "2022 Workshop on Cyber Physical Systems for Emergency Response (CPS-ER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08812988", "title": "Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2020/01/08812988/1cOhCfAgaZO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2020/5697/0/09086289", "title": "SCANViz: Interpreting the Symbol-Concept Association Captured by Deep Neural Networks through Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2020/09086289/1kuHnRNNrqw", "parentPublication": { "id": "proceedings/pacificvis/2020/5697/0", "title": "2020 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tase/2020/4086/0/408600a073", "title": "Feature-oriented Design of Visual Analytics System for Interpretable Deep Learning based Intrusion Detection", "doi": null, "abstractUrl": "/proceedings-article/tase/2020/408600a073/1t0HAB8lCE0", "parentPublication": { "id": "proceedings/tase/2020/4086/0", "title": "2020 International Symposium on Theoretical Aspects of Software Engineering (TASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2021/3931/0/393100a186", "title": "Investigating the Evolution of Tree Boosting Models with Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2021/393100a186/1tTtslm0K4g", "parentPublication": { "id": "proceedings/pacificvis/2021/3931/0", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09222060", "articleId": "1nTquHN7hbq", "__typename": "AdjacentArticleType" }, "next": { "fno": "09222325", "articleId": "1nTrMkbZAQg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qRIJjr2Iwg", "name": "ttg202102-09219240s1-supp1-3028888.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09219240s1-supp1-3028888.mp4", "extension": "mp4", "size": "53.1 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nV65avjF8k", "doi": "10.1109/TVCG.2020.3028976", "abstract": "Advances in language modeling have led to the development of deep attention-based models that are performant across a wide variety of natural language processing (NLP) problems. These language models are typified by a pre-training process on large unlabeled text corpora and subsequently fine-tuned for specific tasks. Although considerable work has been devoted to understanding the attention mechanisms of pre-trained models, it is less understood how a model's attention mechanisms change when trained for a target NLP task. In this paper, we propose a visual analytics approach to understanding fine-tuning in attention-based language models. Our visualization, Attention Flows, is designed to support users in querying, tracing, and comparing attention within layers, across layers, and amongst attention heads in Transformer-based language models. To help users gain insight on how a classification decision is made, our design is centered on depicting classification-based attention at the deepest layer and how attention from prior layers flows throughout words in the input. Attention Flows supports the analysis of a single model, as well as the visual comparison between pre-trained and fine-tuned models via their similarities and differences. We use Attention Flows to study attention mechanisms in various sentence understanding tasks and highlight how attention evolves to address the nuances of solving these tasks.", "abstracts": [ { "abstractType": "Regular", "content": "Advances in language modeling have led to the development of deep attention-based models that are performant across a wide variety of natural language processing (NLP) problems. These language models are typified by a pre-training process on large unlabeled text corpora and subsequently fine-tuned for specific tasks. Although considerable work has been devoted to understanding the attention mechanisms of pre-trained models, it is less understood how a model's attention mechanisms change when trained for a target NLP task. In this paper, we propose a visual analytics approach to understanding fine-tuning in attention-based language models. Our visualization, Attention Flows, is designed to support users in querying, tracing, and comparing attention within layers, across layers, and amongst attention heads in Transformer-based language models. To help users gain insight on how a classification decision is made, our design is centered on depicting classification-based attention at the deepest layer and how attention from prior layers flows throughout words in the input. Attention Flows supports the analysis of a single model, as well as the visual comparison between pre-trained and fine-tuned models via their similarities and differences. We use Attention Flows to study attention mechanisms in various sentence understanding tasks and highlight how attention evolves to address the nuances of solving these tasks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Advances in language modeling have led to the development of deep attention-based models that are performant across a wide variety of natural language processing (NLP) problems. These language models are typified by a pre-training process on large unlabeled text corpora and subsequently fine-tuned for specific tasks. Although considerable work has been devoted to understanding the attention mechanisms of pre-trained models, it is less understood how a model's attention mechanisms change when trained for a target NLP task. In this paper, we propose a visual analytics approach to understanding fine-tuning in attention-based language models. Our visualization, Attention Flows, is designed to support users in querying, tracing, and comparing attention within layers, across layers, and amongst attention heads in Transformer-based language models. To help users gain insight on how a classification decision is made, our design is centered on depicting classification-based attention at the deepest layer and how attention from prior layers flows throughout words in the input. Attention Flows supports the analysis of a single model, as well as the visual comparison between pre-trained and fine-tuned models via their similarities and differences. We use Attention Flows to study attention mechanisms in various sentence understanding tasks and highlight how attention evolves to address the nuances of solving these tasks.", "title": "Attention Flows: Analyzing and Comparing Attention Mechanisms in Language Models", "normalizedTitle": "Attention Flows: Analyzing and Comparing Attention Mechanisms in Language Models", "fno": "09224153", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Visualisation", "Natural Language Processing", "Text Analysis", "Language Modeling", "Deep Attention Based Models", "Natural Language Processing Problems", "Attention Based Language Models", "Transformer Based Language Models", "Classification Based Attention", "NLP Task", "Attention Flows Visualization", "Task Analysis", "Analytical Models", "Bit Error Rate", "Computational Modeling", "Visual Analytics", "Natural Language Processing", "NLP", "Transformer", "Visual Analytics" ], "authors": [ { "givenName": "Joseph F.", "surname": "DeRose", "fullName": "Joseph F. DeRose", "affiliation": "Vanderbilt University", "__typename": "ArticleAuthorType" }, { "givenName": "Jiayao", "surname": "Wang", "fullName": "Jiayao Wang", "affiliation": "Vanderbilt University", "__typename": "ArticleAuthorType" }, { "givenName": "Matthew", "surname": "Berger", "fullName": "Matthew Berger", "affiliation": "Vanderbilt University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "1160-1170", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpc/2022/9298/0/929800a437", "title": "An Exploratory Study on Code Attention in BERT", "doi": null, "abstractUrl": "/proceedings-article/icpc/2022/929800a437/1EpKMbscdIA", "parentPublication": { "id": "proceedings/icpc/2022/9298/0", "title": "2022 IEEE/ACM 30th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09964397", "title": "PhraseMap: Attention-Based Keyphrases Recommendation for Information Seeking", "doi": null, "abstractUrl": "/journal/tg/5555/01/09964397/1IFELlEsIve", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956729", "title": "MLSAN: Mixed-Lattice Self-Attention Network for Chinese Named Entity Recognition", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956729/1IHp2tTJTEc", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a947", "title": "Join-Chain Network: A Logical Reasoning View of the Multi-head Attention in Transformer", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a947/1KBqTIaqD1m", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/06/10081322", "title": "How Does Attention Work in Vision Transformers? A Visual Analytics Attempt", "doi": null, "abstractUrl": "/journal/tg/2023/06/10081322/1LRbRtJhrG0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2019/6092/0/609200a113", "title": "Relation Extraction via Attention-Based CNNs using Token-Level Representations", "doi": null, "abstractUrl": "/proceedings-article/cis/2019/609200a113/1i5m1fQUmw8", "parentPublication": { "id": "proceedings/cis/2019/6092/0", "title": "2019 15th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2020/6332/0/633200a158", "title": "ICAN: Introspective Convolutional Attention Network for Semantic Text Classification", "doi": null, "abstractUrl": "/proceedings-article/icsc/2020/633200a158/1iffC6EwegE", "parentPublication": { "id": "proceedings/icsc/2020/6332/0", "title": "2020 IEEE 14th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpca/2020/6149/0/614900a328", "title": "A^3: Accelerating Attention Mechanisms in Neural Networks with Approximation", "doi": null, "abstractUrl": "/proceedings-article/hpca/2020/614900a328/1j9wse7gnHa", "parentPublication": { "id": "proceedings/hpca/2020/6149/0", "title": "2020 IEEE International Symposium on High Performance Computer Architecture (HPCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdatasecurity-hpsc-ids/2020/6873/0/09123057", "title": "Multi-label Classification for Clinical Text with Feature-level Attention", "doi": null, "abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2020/09123057/1kTB4te7a9y", "parentPublication": { "id": "proceedings/bigdatasecurity-hpsc-ids/2020/6873/0", "title": "2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2020/6609/0/660900a562", "title": "Attention-based Bidirectional Long Short-Term Memory Networks for Relation Classification Using Knowledge Distillation from BERT", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2020/660900a562/1oFGPa1dhra", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2020/6609/0", "title": "2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09220137", "articleId": "1nRLN0fSuiI", "__typename": "AdjacentArticleType" }, "next": { "fno": "09222346", "articleId": "1nTqW9mGTrG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qLdg3Rn6WA", "name": "ttg202102-09224153s1-tvcg-3028976-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09224153s1-tvcg-3028976-mm.zip", "extension": "zip", "size": "340 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1Hcio5iMQBW", "title": "Nov.", "year": "2022", "issueNum": "11", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xjQQnXqTO8", "doi": "10.1109/TPAMI.2021.3116668", "abstract": "Deep generative models are a class of techniques that train deep neural networks to model the distribution of training samples. Research has fragmented into various interconnected approaches, each of which make trade-offs including run-time, diversity, and architectural restrictions. In particular, this compendium covers energy-based models, variational autoencoders, generative adversarial networks, autoregressive models, normalizing flows, in addition to numerous hybrid approaches. These techniques are compared and contrasted, explaining the premises behind each and how they are interrelated, while reviewing current state-of-the-art advances and implementations.", "abstracts": [ { "abstractType": "Regular", "content": "Deep generative models are a class of techniques that train deep neural networks to model the distribution of training samples. Research has fragmented into various interconnected approaches, each of which make trade-offs including run-time, diversity, and architectural restrictions. In particular, this compendium covers energy-based models, variational autoencoders, generative adversarial networks, autoregressive models, normalizing flows, in addition to numerous hybrid approaches. These techniques are compared and contrasted, explaining the premises behind each and how they are interrelated, while reviewing current state-of-the-art advances and implementations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep generative models are a class of techniques that train deep neural networks to model the distribution of training samples. Research has fragmented into various interconnected approaches, each of which make trade-offs including run-time, diversity, and architectural restrictions. In particular, this compendium covers energy-based models, variational autoencoders, generative adversarial networks, autoregressive models, normalizing flows, in addition to numerous hybrid approaches. These techniques are compared and contrasted, explaining the premises behind each and how they are interrelated, while reviewing current state-of-the-art advances and implementations.", "title": "Deep Generative Modelling: A Comparative Review of VAEs, GANs, Normalizing Flows, Energy-Based and Autoregressive Models", "normalizedTitle": "Deep Generative Modelling: A Comparative Review of VAEs, GANs, Normalizing Flows, Energy-Based and Autoregressive Models", "fno": "09555209", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Autoregressive Processes", "Deep Learning Artificial Intelligence", "Variational Autoencoders", "GA Ns", "VA Es", "Deep Generative Modelling", "Normalizing Flows", "Autoregressive Models", "Generative Adversarial Networks", "Energy Based Models", "Deep Neural Networks", "Data Models", "Training", "Computational Modeling", "Analytical Models", "Generative Adversarial Networks", "Predictive Models", "Neurons", "Deep Learning", "Generative Models", "Energy Based Models", "Variational Autoencoders", "Generative Adversarial Networks", "Autoregressive Models", "Normalizing Flows" ], "authors": [ { "givenName": "Sam", "surname": "Bond-Taylor", "fullName": "Sam Bond-Taylor", "affiliation": "Department of Computer Science, Durham University, Durham, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Adam", "surname": "Leach", "fullName": "Adam Leach", "affiliation": "Department of Computer Science, Durham University, Durham, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Yang", "surname": "Long", "fullName": "Yang Long", "affiliation": "Department of Computer Science, Durham University, Durham, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Chris G.", "surname": "Willcocks", "fullName": "Chris G. Willcocks", "affiliation": "Department of Computer Science, Durham University, Durham, U.K.", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "11", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "7327-7347", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bigmm/2018/5321/0/08499105", "title": "SegGAN: Semantic Segmentation with Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2018/08499105/17D45WHONn7", "parentPublication": { "id": "proceedings/bigmm/2018/5321/0", "title": "2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/09/08691787", "title": "Memory Augmented Deep Generative Models for Forecasting the Next Shot Location in Tennis", "doi": null, "abstractUrl": "/journal/tk/2020/09/08691787/19fxnrnNwnC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/06/09968154", "title": "GH-Feat: Learning Versatile Generative Hierarchical Features From GANs", "doi": null, "abstractUrl": "/journal/tp/2023/06/09968154/1IKD8njpVcI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10076832", "title": "StyleVR: Stylizing Character Animations with Normalizing Flows", "doi": null, "abstractUrl": "/journal/tg/5555/01/10076832/1LFQ6Ir6DEQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300e540", "title": "PointFlow: 3D Point Cloud Generation With Continuous Normalizing Flows", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300e540/1hQqlMAar9S", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300d165", "title": "Noise Flow: Noise Modeling With Conditional Normalizing Flows", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300d165/1hVllwEnMrK", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/11/09089305", "title": "Normalizing Flows: An Introduction and Review of Current Methods", "doi": null, "abstractUrl": "/journal/tp/2021/11/09089305/1jDwlyVxAwE", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i412", "title": "Normalizing Flows With Multi-Scale Autoregressive Priors", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i412/1m3nVK3M0Cs", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400b487", "title": "IInfoGAN: Improved Information Maximizing Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400b487/1tzyXkAxwcw", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428197", "title": "Towards GANs&#x2019; Approximation Ability", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428197/1uilS2zcsBa", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09517020", "articleId": "1watWbE6lvW", "__typename": "AdjacentArticleType" }, "next": { "fno": "09524471", "articleId": "1wpq5To7ikU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvGPE8n", "title": "Jan.", "year": "2016", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "22", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxBa567", "doi": "10.1109/TVCG.2015.2467555", "abstract": "Through online health communities (OHCs), patients and caregivers exchange their illness experiences and strategies for overcoming the illness, and provide emotional support. To facilitate healthy and lively conversations in these communities, their members should be continuously monitored and nurtured by OHC administrators. The main challenge of OHC administrators' tasks lies in understanding the diverse dimensions of conversation threads that lead to productive discussions in their communities. In this paper, we present a design study in which three domain expert groups participated, an OHC researcher and two OHC administrators of online health communities, which was conducted to find with a visual analytic solution. Through our design study, we characterized the domain goals of OHC administrators and derived tasks to achieve these goals. As a result of this study, we propose a system called VisOHC, which visualizes individual OHC conversation threads as collapsed boxes-a visual metaphor of conversation threads. In addition, we augmented the posters' reply authorship network with marks and/or beams to show conversation dynamics within threads. We also developed unique measures tailored to the characteristics of OHCs, which can be encoded for thread visualizations at the users' requests. Our observation of the two administrators while using VisOHC showed that it supports their tasks and reveals interesting insights into online health communities. Finally, we share our methodological lessons on probing visual designs together with domain experts by allowing them to freely encode measurements into visual variables.", "abstracts": [ { "abstractType": "Regular", "content": "Through online health communities (OHCs), patients and caregivers exchange their illness experiences and strategies for overcoming the illness, and provide emotional support. To facilitate healthy and lively conversations in these communities, their members should be continuously monitored and nurtured by OHC administrators. The main challenge of OHC administrators' tasks lies in understanding the diverse dimensions of conversation threads that lead to productive discussions in their communities. In this paper, we present a design study in which three domain expert groups participated, an OHC researcher and two OHC administrators of online health communities, which was conducted to find with a visual analytic solution. Through our design study, we characterized the domain goals of OHC administrators and derived tasks to achieve these goals. As a result of this study, we propose a system called VisOHC, which visualizes individual OHC conversation threads as collapsed boxes-a visual metaphor of conversation threads. In addition, we augmented the posters' reply authorship network with marks and/or beams to show conversation dynamics within threads. We also developed unique measures tailored to the characteristics of OHCs, which can be encoded for thread visualizations at the users' requests. Our observation of the two administrators while using VisOHC showed that it supports their tasks and reveals interesting insights into online health communities. Finally, we share our methodological lessons on probing visual designs together with domain experts by allowing them to freely encode measurements into visual variables.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Through online health communities (OHCs), patients and caregivers exchange their illness experiences and strategies for overcoming the illness, and provide emotional support. To facilitate healthy and lively conversations in these communities, their members should be continuously monitored and nurtured by OHC administrators. The main challenge of OHC administrators' tasks lies in understanding the diverse dimensions of conversation threads that lead to productive discussions in their communities. In this paper, we present a design study in which three domain expert groups participated, an OHC researcher and two OHC administrators of online health communities, which was conducted to find with a visual analytic solution. Through our design study, we characterized the domain goals of OHC administrators and derived tasks to achieve these goals. As a result of this study, we propose a system called VisOHC, which visualizes individual OHC conversation threads as collapsed boxes-a visual metaphor of conversation threads. In addition, we augmented the posters' reply authorship network with marks and/or beams to show conversation dynamics within threads. We also developed unique measures tailored to the characteristics of OHCs, which can be encoded for thread visualizations at the users' requests. Our observation of the two administrators while using VisOHC showed that it supports their tasks and reveals interesting insights into online health communities. Finally, we share our methodological lessons on probing visual designs together with domain experts by allowing them to freely encode measurements into visual variables.", "title": "VisOHC: Designing Visual Analytics for Online Health Communities", "normalizedTitle": "VisOHC: Designing Visual Analytics for Online Health Communities", "fno": "07192683", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Message Systems", "Atmospheric Measurements", "Particle Measurements", "Visual Analytics", "Prototypes", "Market Research", "Design Study", "Online Health Communities", "Visual Analytics", "Conversation Analysis", "Thread Visualization", "Healthcare", "Design Study", "Online Health Communities", "Visual Analytics", "Conversation Analysis", "Thread Visualization", "Healthcare" ], "authors": [ { "givenName": "Bum Chul", "surname": "Kwon", "fullName": "Bum Chul Kwon", "affiliation": ", University of Konstanz", "__typename": "ArticleAuthorType" }, { "givenName": "Sung-Hee", "surname": "Kim", "fullName": "Sung-Hee Kim", "affiliation": ", University of British Columbia", "__typename": "ArticleAuthorType" }, { "givenName": "Sukwon", "surname": "Lee", "fullName": "Sukwon Lee", "affiliation": ", Purdue University", "__typename": "ArticleAuthorType" }, { "givenName": "Jaegul", "surname": "Choo", "fullName": "Jaegul Choo", "affiliation": ", Korea University", "__typename": "ArticleAuthorType" }, { "givenName": "Jina", "surname": "Huh", "fullName": "Jina Huh", "affiliation": ", Michigan State University", "__typename": "ArticleAuthorType" }, { "givenName": "Ji Soo", "surname": "Yi", "fullName": "Ji Soo Yi", "affiliation": ", Purdue University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2016-01-01 00:00:00", "pubType": "trans", "pages": "71-80", "year": "2016", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/passat-socialcom/2012/5638/0/06406255", "title": "What Makes Communities Tick? Community Health Analysis Using Role Compositions", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2012/06406255/12OmNAio73s", "parentPublication": { "id": "proceedings/passat-socialcom/2012/5638/0", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2016/6117/0/6117a281", "title": "Personalized Recommendation in Online Health Communities with Heterogeneous Network Mining", "doi": null, "abstractUrl": "/proceedings-article/ichi/2016/6117a281/12OmNBkfRk1", "parentPublication": { "id": "proceedings/ichi/2016/6117/0", "title": "2016 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2011/1931/0/06113125", "title": "Get Online Support, Feel Better -- Sentiment Analysis and Dynamics in an Online Cancer Survivor Community", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113125/12OmNCeK2h4", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2015/9548/0/9548a048", "title": "The Evolution and Diffusion of User Roles in Online Health Communities: A Social Support Perspective", "doi": null, "abstractUrl": "/proceedings-article/ichi/2015/9548a048/12OmNyLiutE", "parentPublication": { "id": "proceedings/ichi/2015/9548/0", "title": "2015 International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2015/9548/0/9548a483", "title": "Predicting User Participation and Detecting User Role Diffusion in Online Health Communities", "doi": null, "abstractUrl": "/proceedings-article/ichi/2015/9548a483/12OmNz3bdNY", "parentPublication": { "id": "proceedings/ichi/2015/9548/0", "title": "2015 International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258570", "title": "Understanding a moderating effect of physicians' endorsement to online workload: An empirical study in online health-care communities", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258570/17D45XoXP5u", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2022/6845/0/684500a348", "title": "Different Length, Different Needs: Qualitative Analysis of Threads in Online Health Communities", "doi": null, "abstractUrl": "/proceedings-article/ichi/2022/684500a348/1GvdFS3EfMQ", "parentPublication": { "id": "proceedings/ichi/2022/6845/0", "title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068644", "title": "Quantifying How Hateful Communities Radicalize Online Users", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068644/1LKx4OWAzUA", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2019/9138/0/08904879", "title": "Analyzing Patient Decision Making in Online Health Communities", "doi": null, "abstractUrl": "/proceedings-article/ichi/2019/08904879/1f8N75fnq7e", "parentPublication": { "id": "proceedings/ichi/2019/9138/0", "title": "2019 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2019/9138/0/08904689", "title": "Identifying Privacy Leakage from User-Generated Content in An Online Health Community-A deep learning approach", "doi": null, "abstractUrl": "/proceedings-article/ichi/2019/08904689/1f8Na3Pby8g", "parentPublication": { "id": "proceedings/ichi/2019/9138/0", "title": "2019 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07192649", "articleId": "13rRUzp02op", "__typename": "AdjacentArticleType" }, "next": { "fno": "07194847", "articleId": "13rRUwbJD4O", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvAiSlM", "title": "Jan.", "year": "2017", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": "29", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUIJcWlM", "doi": "10.1109/TKDE.2016.2606098", "abstract": "In this work, we propose a novel way to consider the clustering and the reduction of the dimension simultaneously. Indeed, our approach takes advantage of the mutual reinforcement between data reduction and clustering tasks. The use of a low-dimensional representation can be of help in providing simpler and more interpretable solutions. We show that by doing so, our model is able to better approximate the relaxed continuous dimension reduction solution by the true discrete clustering solution. Experiment results show that our method gives better results in terms of clustering than the state-of-the-art algorithms devoted to similar tasks for data sets with different proprieties.", "abstracts": [ { "abstractType": "Regular", "content": "In this work, we propose a novel way to consider the clustering and the reduction of the dimension simultaneously. Indeed, our approach takes advantage of the mutual reinforcement between data reduction and clustering tasks. The use of a low-dimensional representation can be of help in providing simpler and more interpretable solutions. We show that by doing so, our model is able to better approximate the relaxed continuous dimension reduction solution by the true discrete clustering solution. Experiment results show that our method gives better results in terms of clustering than the state-of-the-art algorithms devoted to similar tasks for data sets with different proprieties.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this work, we propose a novel way to consider the clustering and the reduction of the dimension simultaneously. Indeed, our approach takes advantage of the mutual reinforcement between data reduction and clustering tasks. The use of a low-dimensional representation can be of help in providing simpler and more interpretable solutions. We show that by doing so, our model is able to better approximate the relaxed continuous dimension reduction solution by the true discrete clustering solution. Experiment results show that our method gives better results in terms of clustering than the state-of-the-art algorithms devoted to similar tasks for data sets with different proprieties.", "title": "A Semi-NMF-PCA Unified Framework for Data Clustering", "normalizedTitle": "A Semi-NMF-PCA Unified Framework for Data Clustering", "fno": "07560670", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Principal Component Analysis", "Clustering Algorithms", "Linear Programming", "Partitioning Algorithms", "Optimization", "Matrix Decomposition", "Clustering Methods", "Locality Preserving", "Clustering", "Dimension Reduction" ], "authors": [ { "givenName": "Kais", "surname": "Allab", "fullName": "Kais Allab", "affiliation": "Laboratory of Informatics Paris Descartes, University of Paris Descartes, Paris, Ile de France, France", "__typename": "ArticleAuthorType" }, { "givenName": "Lazhar", "surname": "Labiod", "fullName": "Lazhar Labiod", "affiliation": "Laboratory of Informatics Paris Descartes, University of Paris Descartes, Paris, Ile de France, France", "__typename": "ArticleAuthorType" }, { "givenName": "Mohamed", "surname": "Nadif", "fullName": "Mohamed Nadif", "affiliation": "UFR Mathematics and Informatics, University of Paris Descartes, Paris, Ile de France, France", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2017-01-01 00:00:00", "pubType": "trans", "pages": "2-16", "year": "2017", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hpcc-euc/2013/5088/0/06832123", "title": "An New Algorithm on Feature Selection with L-Norm PCA", "doi": null, "abstractUrl": "/proceedings-article/hpcc-euc/2013/06832123/12OmNBhpS94", "parentPublication": { "id": "proceedings/hpcc-euc/2013/5088/0", "title": "2013 IEEE International Conference on High Performance Computing and Communications (HPCC) & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2015/8006/0/8006b009", "title": "PCAH: A PCA-Based Hierarchical Clustering Method for Visual Words Construction", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2015/8006b009/12OmNvqEvOK", "parentPublication": { "id": "proceedings/ccgrid/2015/8006/0", "title": "2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2014/4302/0/4302a130", "title": "Finding the Optimal Subspace for Clustering", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302a130/12OmNySosK0", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2015/9504/0/9504a679", "title": "Simultaneous Semi-NMF and PCA for Clustering", "doi": null, "abstractUrl": "/proceedings-article/icdm/2015/9504a679/12OmNz61dfP", "parentPublication": { "id": "proceedings/icdm/2015/9504/0", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019882", "title": "Towards a Systematic Combination of Dimension Reduction and Clustering in Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019882/13rRUIJuxvq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sera/2018/5886/0/08477221", "title": "Time Series Clustering via NMF in Networks", "doi": null, "abstractUrl": "/proceedings-article/sera/2018/08477221/144U9bnXAFo", "parentPublication": { "id": "proceedings/sera/2018/5886/0", "title": "2018 IEEE 16th International Conference on Software Engineering Research, Management and Applications (SERA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/12/08493549", "title": "Dual Hypergraph Regularized PCA for Biclustering of Tumor Gene Expression Data", "doi": null, "abstractUrl": "/journal/tk/2019/12/08493549/14qdcRk7agg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2019/4288/0/428800a001", "title": "Feature selection for clustering online learners", "doi": null, "abstractUrl": "/proceedings-article/eitt/2019/428800a001/1fHkPBXiD8Q", "parentPublication": { "id": "proceedings/eitt/2019/4288/0", "title": "2019 Eighth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2020/08/09007481", "title": "Local-Density Subspace Distributed Clustering for High-Dimensional Data", "doi": null, "abstractUrl": "/journal/td/2020/08/09007481/1hJKnK74MJa", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/02/09201345", "title": "Statistical Analysis of Microarray Data Clustering using NMF, Spectral Clustering, Kmeans, and GMM", "doi": null, "abstractUrl": "/journal/tb/2022/02/09201345/1niU3Gn5ZhC", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07775126", "articleId": "13rRUxcbnCZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "07536145", "articleId": "13rRUwh80Hz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNCaLEju", "title": "Jan.", "year": "2018", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "24", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwInv4t", "doi": "10.1109/TVCG.2017.2745085", "abstract": "Clustering, the process of grouping together similar items into distinct partitions, is a common type of unsupervised machine learning that can be useful for summarizing and aggregating complex multi-dimensional data. However, data can be clustered in many ways, and there exist a large body of algorithms designed to reveal different patterns. While having access to a wide variety of algorithms is helpful, in practice, it is quite difficult for data scientists to choose and parameterize algorithms to get the clustering results relevant for their dataset and analytical tasks. To alleviate this problem, we built Clustervision, a visual analytics tool that helps ensure data scientists find the right clustering among the large amount of techniques and parameters available. Our system clusters data using a variety of clustering techniques and parameters and then ranks clustering results utilizing five quality metrics. In addition, users can guide the system to produce more relevant results by providing task-relevant constraints on the data. Our visual user interface allows users to find high quality clustering results, explore the clusters using several coordinated visualization techniques, and select the cluster result that best suits their task. We demonstrate this novel approach using a case study with a team of researchers in the medical domain and showcase that our system empowers users to choose an effective representation of their complex data.", "abstracts": [ { "abstractType": "Regular", "content": "Clustering, the process of grouping together similar items into distinct partitions, is a common type of unsupervised machine learning that can be useful for summarizing and aggregating complex multi-dimensional data. However, data can be clustered in many ways, and there exist a large body of algorithms designed to reveal different patterns. While having access to a wide variety of algorithms is helpful, in practice, it is quite difficult for data scientists to choose and parameterize algorithms to get the clustering results relevant for their dataset and analytical tasks. To alleviate this problem, we built Clustervision, a visual analytics tool that helps ensure data scientists find the right clustering among the large amount of techniques and parameters available. Our system clusters data using a variety of clustering techniques and parameters and then ranks clustering results utilizing five quality metrics. In addition, users can guide the system to produce more relevant results by providing task-relevant constraints on the data. Our visual user interface allows users to find high quality clustering results, explore the clusters using several coordinated visualization techniques, and select the cluster result that best suits their task. We demonstrate this novel approach using a case study with a team of researchers in the medical domain and showcase that our system empowers users to choose an effective representation of their complex data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Clustering, the process of grouping together similar items into distinct partitions, is a common type of unsupervised machine learning that can be useful for summarizing and aggregating complex multi-dimensional data. However, data can be clustered in many ways, and there exist a large body of algorithms designed to reveal different patterns. While having access to a wide variety of algorithms is helpful, in practice, it is quite difficult for data scientists to choose and parameterize algorithms to get the clustering results relevant for their dataset and analytical tasks. To alleviate this problem, we built Clustervision, a visual analytics tool that helps ensure data scientists find the right clustering among the large amount of techniques and parameters available. Our system clusters data using a variety of clustering techniques and parameters and then ranks clustering results utilizing five quality metrics. In addition, users can guide the system to produce more relevant results by providing task-relevant constraints on the data. Our visual user interface allows users to find high quality clustering results, explore the clusters using several coordinated visualization techniques, and select the cluster result that best suits their task. We demonstrate this novel approach using a case study with a team of researchers in the medical domain and showcase that our system empowers users to choose an effective representation of their complex data.", "title": "Clustervision: Visual Supervision of Unsupervised Clustering", "normalizedTitle": "Clustervision: Visual Supervision of Unsupervised Clustering", "fno": "08019866", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Clustering Algorithms", "Measurement", "Visual Analytics", "Partitioning Algorithms", "Data Visualization", "Indexes", "Unsupervised Clustering", "Visual Analytics", "Quality Metrics", "Interactive Visual Clustering" ], "authors": [ { "givenName": "Bum Chul", "surname": "Kwon", "fullName": "Bum Chul Kwon", "affiliation": "IBM T.J. Watson Research Center, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Ben", "surname": "Eysenbach", "fullName": "Ben Eysenbach", "affiliation": "Massachusetts Institute of Technology, Cambridge, MA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Janu", "surname": "Verma", "fullName": "Janu Verma", "affiliation": "IBM T.J. Watson Research Center, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Kenney", "surname": "Ng", "fullName": "Kenney Ng", "affiliation": "IBM T.J. Watson Research Center, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Christopher", "surname": "De Filippi", "fullName": "Christopher De Filippi", "affiliation": "Inova Heart and Vascular Institute, Fairfax, VA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Walter F.", "surname": "Stewart", "fullName": "Walter F. Stewart", "affiliation": "Sutter Health Research, Walnut Creek, California, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Adam", "surname": "Perer", "fullName": "Adam Perer", "affiliation": "IBM T.J. Watson Research Center, NY, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2018-01-01 00:00:00", "pubType": "trans", "pages": "142-151", "year": "2018", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vast/2014/6227/0/07042514", "title": "Visual analysis of missing data — To see what isn't there", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042514/12OmNxzMnNA", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2012/5026/0/06481030", "title": "Variable Density Based Genetic Clustering", "doi": null, "abstractUrl": "/proceedings-article/synasc/2012/06481030/12OmNzahbYD", "parentPublication": { "id": "proceedings/synasc/2012/5026/0", "title": "2012 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2009/02/mcg2009020014", "title": "Defining Insight for Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2009/02/mcg2009020014/13rRUwh80JN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040063", "title": "The Top 10 Challenges in Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040063/13rRUxC0SGA", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122179", "title": "Visual Analytics for Spatial Clustering: Using a Heuristic Approach for Guided Exploration", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122179/13rRUyeTVi3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122829", "title": "Scatter/Gather Clustering: Flexibly Incorporating User Feedback to Steer Clustering Results", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122829/13rRUypp57E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440035", "title": "Clustrophile 2: Guided Visual Clustering Analysis", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440035/17D45WnnFYU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vds/2022/5721/0/572100a001", "title": "Case Study Comparison of Computational Notebook Platforms for Interactive Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/vds/2022/572100a001/1JezLhI4Vm8", "parentPublication": { "id": "proceedings/vds/2022/5721/0", "title": "2022 IEEE Visualization in Data Science (VDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiotcs/2022/3410/0/341000a206", "title": "Data Mining Analysis of New Energy Vehicles Based on Constrained Clustering Algorithm", "doi": null, "abstractUrl": "/proceedings-article/aiotcs/2022/341000a206/1MuZOoZmef6", "parentPublication": { "id": "proceedings/aiotcs/2022/3410/0", "title": "2022 International Conference on Artificial Intelligence of Things and Crowdsensing (AIoTCs)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09237999", "title": "Integrating Prior Knowledge in Mixed-Initiative Social Network Clustering", "doi": null, "abstractUrl": "/journal/tg/2021/02/09237999/1oa15tKyG9W", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08019882", "articleId": "13rRUIJuxvq", "__typename": "AdjacentArticleType" }, "next": { "fno": "08017618", "articleId": "13rRUwghd55", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgEH", "name": "ttg201801-08019866s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201801-08019866s1.zip", "extension": "zip", "size": "81.9 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNz6iObM", "title": "July-Aug.", "year": "2015", "issueNum": "04", "idPrefix": "tb", "pubType": "journal", "volume": "12", "label": "July-Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxbCbrZ", "doi": "10.1109/TCBB.2014.2361348", "abstract": "Cluster analysis of biological networks is one of the most important approaches for identifying functional modules and predicting protein functions. Furthermore, visualization of clustering results is crucial to uncover the structure of biological networks. In this paper, ClusterViz, an APP of Cytoscape 3 for cluster analysis and visualization, has been developed. In order to reduce complexity and enable extendibility for ClusterViz, we designed the architecture of ClusterViz based on the framework of Open Services Gateway Initiative. According to the architecture, the implementation of ClusterViz is partitioned into three modules including interface of ClusterViz, clustering algorithms and visualization and export. ClusterViz fascinates the comparison of the results of different algorithms to do further related analysis. Three commonly used clustering algorithms, FAG-EC, EAGLE and MCODE, are included in the current version. Due to adopting the abstract interface of algorithms in module of the clustering algorithms, more clustering algorithms can be included for the future use. To illustrate usability of ClusterViz, we provided three examples with detailed steps from the important scientific articles, which show that our tool has helped several research teams do their research work on the mechanism of the biological networks.", "abstracts": [ { "abstractType": "Regular", "content": "Cluster analysis of biological networks is one of the most important approaches for identifying functional modules and predicting protein functions. Furthermore, visualization of clustering results is crucial to uncover the structure of biological networks. In this paper, ClusterViz, an APP of Cytoscape 3 for cluster analysis and visualization, has been developed. In order to reduce complexity and enable extendibility for ClusterViz, we designed the architecture of ClusterViz based on the framework of Open Services Gateway Initiative. According to the architecture, the implementation of ClusterViz is partitioned into three modules including interface of ClusterViz, clustering algorithms and visualization and export. ClusterViz fascinates the comparison of the results of different algorithms to do further related analysis. Three commonly used clustering algorithms, FAG-EC, EAGLE and MCODE, are included in the current version. Due to adopting the abstract interface of algorithms in module of the clustering algorithms, more clustering algorithms can be included for the future use. To illustrate usability of ClusterViz, we provided three examples with detailed steps from the important scientific articles, which show that our tool has helped several research teams do their research work on the mechanism of the biological networks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cluster analysis of biological networks is one of the most important approaches for identifying functional modules and predicting protein functions. Furthermore, visualization of clustering results is crucial to uncover the structure of biological networks. In this paper, ClusterViz, an APP of Cytoscape 3 for cluster analysis and visualization, has been developed. In order to reduce complexity and enable extendibility for ClusterViz, we designed the architecture of ClusterViz based on the framework of Open Services Gateway Initiative. According to the architecture, the implementation of ClusterViz is partitioned into three modules including interface of ClusterViz, clustering algorithms and visualization and export. ClusterViz fascinates the comparison of the results of different algorithms to do further related analysis. Three commonly used clustering algorithms, FAG-EC, EAGLE and MCODE, are included in the current version. Due to adopting the abstract interface of algorithms in module of the clustering algorithms, more clustering algorithms can be included for the future use. To illustrate usability of ClusterViz, we provided three examples with detailed steps from the important scientific articles, which show that our tool has helped several research teams do their research work on the mechanism of the biological networks.", "title": "ClusterViz: A Cytoscape APP for Cluster Analysis of Biological Network", "normalizedTitle": "ClusterViz: A Cytoscape APP for Cluster Analysis of Biological Network", "fno": "06915894", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Clustering Algorithms", "Algorithm Design And Analysis", "Partitioning Algorithms", "Proteins", "Visualization", "Protein Engineering", "Visualization", "Cluster", "Cytoscape", "Biological Networks", "FAG EC", "EAGLE", "MCODE" ], "authors": [ { "givenName": "Jianxin", "surname": "Wang", "fullName": "Jianxin Wang", "affiliation": "School of Information Science and Engineering, Central South University Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiancheng", "surname": "Zhong", "fullName": "Jiancheng Zhong", "affiliation": "School of Information Science and Engineering, Central South University Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Gang", "surname": "Chen", "fullName": "Gang Chen", "affiliation": ", Company of BGI-Shenzhen, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Min", "surname": "Li", "fullName": "Min Li", "affiliation": "School of Information Science and Engineering, Central South University Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Fang-xiang", "surname": "Wu", "fullName": "Fang-xiang Wu", "affiliation": "Department of Mechanical Engineering and Division of Biomedical Engineering, University of Saskatchewan, Saskatoon, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "Yi", "surname": "Pan", "fullName": "Yi Pan", "affiliation": "School of Information Science and Engineering, Central South University Changsha, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2015-07-01 00:00:00", "pubType": "trans", "pages": "815-822", "year": "2015", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2010/8306/0/05706634", "title": "NWE: Node-weighted expansion for protein complex prediction using random walk distances", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706634/12OmNASraIz", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08218036", "title": "Analysis of clustering algorithms in biological networks", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08218036/12OmNAlNiIz", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732548", "title": "Cluster tree based multi-label classification for protein function prediction", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732548/12OmNAsBFK9", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2007/3069/0/30690494", "title": "Statistical and Biological Validation Methods in Cluster Analysis of Gene Expression", "doi": null, "abstractUrl": "/proceedings-article/icmla/2007/30690494/12OmNB8kHXJ", "parentPublication": { "id": "proceedings/icmla/2007/3069/0", "title": "2007 International Conference on Machine Learning and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822611", "title": "Mining protein complexes based on topology potential from weighted dynamic PPI network", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822611/12OmNCzKlMI", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2011/4851/0/13", "title": "Bcl::Cluster: A method for clustering biological molecules coupled with visualization in the Pymol Molecular Graphics System", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2011/13/12OmNvkGW3H", "parentPublication": { "id": "proceedings/iccabs/2011/4851/0", "title": "2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706631", "title": "Link-based cluster ensembles for heterogeneous biological data analysis", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706631/12OmNvpNIrD", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2013/0716/0/06629214", "title": "Scalable heuristics for clustering biological graphs", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2013/06629214/12OmNvqEvMn", "parentPublication": { "id": "proceedings/iccabs/2013/0716/0", "title": "2013 IEEE 3rd International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/10066180", "title": "Comparison of methods for biological sequence clustering", "doi": null, "abstractUrl": "/journal/tb/5555/01/10066180/1LtR3RMMiDC", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/01/09090280", "title": "Integrative Biological Network Analysis to Identify Shared Genes in Metabolic Disorders", "doi": null, "abstractUrl": "/journal/tb/2022/01/09090280/1jFb0Hx783K", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06945876", "articleId": "13rRUwbJD3t", "__typename": "AdjacentArticleType" }, "next": { "fno": "06995935", "articleId": "13rRUwfZBYB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNCbCrUN", "title": "Dec.", "year": "2013", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "19", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyeTVi3", "doi": "10.1109/TVCG.2013.224", "abstract": "We propose a novel approach of distance-based spatial clustering and contribute a heuristic computation of input parameters for guiding users in the search of interesting cluster constellations. We thereby combine computational geometry with interactive visualization into one coherent framework. Our approach entails displaying the results of the heuristics to users, as shown in Figure 1, providing a setting from which to start the exploration and data analysis. Addition interaction capabilities are available containing visual feedback for exploring further clustering options and is able to cope with noise in the data. We evaluate, and show the benefits of our approach on a sophisticated artificial dataset and demonstrate its usefulness on real-world data.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a novel approach of distance-based spatial clustering and contribute a heuristic computation of input parameters for guiding users in the search of interesting cluster constellations. We thereby combine computational geometry with interactive visualization into one coherent framework. Our approach entails displaying the results of the heuristics to users, as shown in Figure 1, providing a setting from which to start the exploration and data analysis. Addition interaction capabilities are available containing visual feedback for exploring further clustering options and is able to cope with noise in the data. We evaluate, and show the benefits of our approach on a sophisticated artificial dataset and demonstrate its usefulness on real-world data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a novel approach of distance-based spatial clustering and contribute a heuristic computation of input parameters for guiding users in the search of interesting cluster constellations. We thereby combine computational geometry with interactive visualization into one coherent framework. Our approach entails displaying the results of the heuristics to users, as shown in Figure 1, providing a setting from which to start the exploration and data analysis. Addition interaction capabilities are available containing visual feedback for exploring further clustering options and is able to cope with noise in the data. We evaluate, and show the benefits of our approach on a sophisticated artificial dataset and demonstrate its usefulness on real-world data.", "title": "Visual Analytics for Spatial Clustering: Using a Heuristic Approach for Guided Exploration", "normalizedTitle": "Visual Analytics for Spatial Clustering: Using a Heuristic Approach for Guided Exploration", "fno": "ttg2013122179", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Shape Analysis", "Clustering Algorithms", "Noise Measurement", "Visual Analytics", "Data Visualization", "Image Color Analysis", "Heuristic Algorithms", "I Interactive Visual Clustering", "Shape Analysis", "Clustering Algorithms", "Noise Measurement", "Visual Analytics", "Data Visualization", "Image Color Analysis", "Heuristic Algorithms", "K Order A Alpha Shapes", "Heuristic Based Spatial Clustering" ], "authors": [ { "givenName": "Eli", "surname": "Packer", "fullName": "Eli Packer", "affiliation": "IBM Res. Haifa Lab., Haifa, Israel", "__typename": "ArticleAuthorType" }, { "givenName": "Peter", "surname": "Bak", "fullName": "Peter Bak", "affiliation": "IBM Res. Haifa Lab., Haifa, Israel", "__typename": "ArticleAuthorType" }, { "givenName": "Mikko", "surname": "Nikkila", "fullName": "Mikko Nikkila", "affiliation": "Univ. of Helsinki, Helsinki, Finland", "__typename": "ArticleAuthorType" }, { "givenName": "Valentin", "surname": "Polishchuk", "fullName": "Valentin Polishchuk", "affiliation": "Univ. of Helsinki, Helsinki, Finland", "__typename": "ArticleAuthorType" }, { "givenName": "Harold J.", "surname": "Ship", "fullName": "Harold J. Ship", "affiliation": "IBM Res. Haifa Lab., Haifa, Israel", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2013-12-01 00:00:00", "pubType": "trans", "pages": "2179-2188", "year": "2013", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vast/2014/6227/0/07042521", "title": "Visual analytics for the exploration of multiparametric cancer imaging", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042521/12OmNAGNCeQ", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400514", "title": "Big data exploration through visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400514/12OmNC3XhwY", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2014/5880/0/07051972", "title": "Detecting geo-spatial weather clusters using dynamic heuristic subspaces", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051972/12OmNz2kqfM", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040026", "title": "A Graph Algebra for Scalable Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040026/13rRUILLkpN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122207", "title": "The Impact of Physical Navigation on Spatial Organization for Sensemaking", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122207/13rRUwI5TQZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1363", "title": "High-Dimensional Visual Analytics: Interactive Exploration Guided by Pairwise Views of Point Distributions", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1363/13rRUx0xPIs", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122899", "title": "A Visual Analytics Approach to Multiscale Exploration of Environmental Time Series", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122899/13rRUxDqS8g", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876049", "title": "Progressive Visual Analytics: User-Driven Visual Exploration of In-Progress Analytics", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876049/13rRUyogGAd", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192717", "title": "Reducing Snapshots to Points: A Visual Analytics Approach to Dynamic Network Exploration", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192717/13rRUyp7tWY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585677", "title": "VAST Mini-Challenge 1", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585677/17D45WK5Aox", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2013122169", "articleId": "13rRUxYrbUG", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2013122189", "articleId": "13rRUwdrdSz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXWRIK", "name": "ttg2013122179s.wmv", "location": "https://www.computer.org/csdl/api/v1/extra/ttg2013122179s.wmv", "extension": "wmv", "size": "7.08 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNyPQ4Dx", "title": "Dec.", "year": "2012", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "18", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUypp57E", "doi": "10.1109/TVCG.2012.258", "abstract": "Significant effort has been devoted to designing clustering algorithms that are responsive to user feedback or that incor- porate prior domain knowledge in the form of constraints. However, users desire more expressive forms of interaction to influence clustering outcomes. In our experiences working with diverse application scientists, we have identified an interaction style scat- ter/gather clustering that helps users iteratively restructure clustering results to meet their expectations. As the names indicate, scatter and gather are dual primitives that describe whether clusters in a current segmentation should be broken up further or, al- ternatively, brought back together. By combining scatter and gather operations in a single step, we support very expressive dynamic restructurings of data. Scatter/gather clustering is implemented using a nonlinear optimization framework that achieves both locality of clusters and satisfaction of user-supplied constraints. We illustrate the use of our scatter/gather clustering approach in a visual analytic application to study baffle shapes in the bat biosonar (ears and nose) system. We demonstrate how domain experts are adept at supplying scatter/gather constraints, and how our framework incorporates these constraints effectively without requiring numerous instance-level constraints.", "abstracts": [ { "abstractType": "Regular", "content": "Significant effort has been devoted to designing clustering algorithms that are responsive to user feedback or that incor- porate prior domain knowledge in the form of constraints. However, users desire more expressive forms of interaction to influence clustering outcomes. In our experiences working with diverse application scientists, we have identified an interaction style scat- ter/gather clustering that helps users iteratively restructure clustering results to meet their expectations. As the names indicate, scatter and gather are dual primitives that describe whether clusters in a current segmentation should be broken up further or, al- ternatively, brought back together. By combining scatter and gather operations in a single step, we support very expressive dynamic restructurings of data. Scatter/gather clustering is implemented using a nonlinear optimization framework that achieves both locality of clusters and satisfaction of user-supplied constraints. We illustrate the use of our scatter/gather clustering approach in a visual analytic application to study baffle shapes in the bat biosonar (ears and nose) system. We demonstrate how domain experts are adept at supplying scatter/gather constraints, and how our framework incorporates these constraints effectively without requiring numerous instance-level constraints.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Significant effort has been devoted to designing clustering algorithms that are responsive to user feedback or that incor- porate prior domain knowledge in the form of constraints. However, users desire more expressive forms of interaction to influence clustering outcomes. In our experiences working with diverse application scientists, we have identified an interaction style scat- ter/gather clustering that helps users iteratively restructure clustering results to meet their expectations. As the names indicate, scatter and gather are dual primitives that describe whether clusters in a current segmentation should be broken up further or, al- ternatively, brought back together. By combining scatter and gather operations in a single step, we support very expressive dynamic restructurings of data. Scatter/gather clustering is implemented using a nonlinear optimization framework that achieves both locality of clusters and satisfaction of user-supplied constraints. We illustrate the use of our scatter/gather clustering approach in a visual analytic application to study baffle shapes in the bat biosonar (ears and nose) system. We demonstrate how domain experts are adept at supplying scatter/gather constraints, and how our framework incorporates these constraints effectively without requiring numerous instance-level constraints.", "title": "Scatter/Gather Clustering: Flexibly Incorporating User Feedback to Steer Clustering Results", "normalizedTitle": "Scatter/Gather Clustering: Flexibly Incorporating User Feedback to Steer Clustering Results", "fno": "ttg2012122829", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Clustering Algorithms", "Visual Analytics", "Optimization", "Computer Science", "Linear Programming", "Algorithm Design And Analysis", "Constrained Clustering", "Scatter Gather Clustering", "Alternative Clustering" ], "authors": [ { "givenName": "M. Shahriar", "surname": "Hossain", "fullName": "M. Shahriar Hossain", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Praveen Kumar Reddy", "surname": "Ojili", "fullName": "Praveen Kumar Reddy Ojili", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Cindy", "surname": "Grimm", "fullName": "Cindy Grimm", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Rolf", "surname": "Muller", "fullName": "Rolf Muller", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Layne T.", "surname": "Watson", "fullName": "Layne T. Watson", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Naren", "surname": "Ramakrishnan", "fullName": "Naren Ramakrishnan", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2012-12-01 00:00:00", "pubType": "trans", "pages": "2829-2838", "year": "2012", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cloud/2014/5063/0/5063a376", "title": "Fast Server Deprovisioning through Scatter-Gather Live Migration of Virtual Machines", "doi": null, "abstractUrl": "/proceedings-article/cloud/2014/5063a376/12OmNAZx8Mk", "parentPublication": { "id": "proceedings/cloud/2014/5063/0", "title": "2014 IEEE 7th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2007/3764/0/37640046", "title": "Efficient gather and scatter operations on graphics processors", "doi": null, "abstractUrl": "/proceedings-article/sc/2007/37640046/12OmNB1wkJZ", "parentPublication": { "id": "proceedings/sc/2007/3764/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/2017/4825/0/07995271", "title": "Modeling and evaluation for gather/scatter operations in Vector-SIMD architectures", "doi": null, "abstractUrl": "/proceedings-article/asap/2017/07995271/12OmNwbcJ57", "parentPublication": { "id": "proceedings/asap/2017/4825/0", "title": "2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccae/2009/3569/0/3569a174", "title": "Using Data Clustering to Optimize Scatter Bitmap Index for Membership Queries", "doi": null, "abstractUrl": "/proceedings-article/iccae/2009/3569a174/12OmNwkzupb", "parentPublication": { "id": "proceedings/iccae/2009/3569/0", "title": "2009 International Conference on Computer and Automation Engineering. ICCAE 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2004/2132/1/213210080", "title": "Hierarchical Gather/Scatter Algorithms with Graceful Degradation", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2004/213210080/12OmNy314em", "parentPublication": { "id": "proceedings/ipdps/2004/2132/1", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408b206", "title": "Clustering with Attribute-Level Constraints", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408b206/12OmNzE54wW", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2010/4256/0/4256a561", "title": "Active Spectral Clustering", "doi": null, "abstractUrl": "/proceedings-article/icdm/2010/4256a561/12OmNzzP5OV", "parentPublication": { "id": "proceedings/icdm/2010/4256/0", "title": "2010 IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/1997/09/l0970", "title": "Efficient Algorithms for the Reduce-Scatter Operation in LogGP", "doi": null, "abstractUrl": "/journal/td/1997/09/l0970/13rRUxBrGgn", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2018/01/07274710", "title": "Scatter-Gather Live Migration of Virtual Machines", "doi": null, "abstractUrl": "/journal/cc/2018/01/07274710/13rRUxCitAB", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2019/09/08642840", "title": "On Optimal Trees for Irregular Gather and Scatter Collectives", "doi": null, "abstractUrl": "/journal/td/2019/09/08642840/17PYEksVpK1", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2012122819", "articleId": "13rRUwjGoG1", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2012122839", "articleId": "13rRUB6Sq0z", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwFid7w", "title": "Jan.", "year": "2019", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "25", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45WnnFYU", "doi": "10.1109/TVCG.2018.2864477", "abstract": "Data clustering is a common unsupervised learning method frequently used in exploratory data analysis. However, identifying relevant structures in unlabeled, high-dimensional data is nontrivial, requiring iterative experimentation with clustering parameters as well as data features and instances. The number of possible clusterings for a typical dataset is vast, and navigating in this vast space is also challenging. The absence of ground-truth labels makes it impossible to define an optimal solution, thus requiring user judgment to establish what can be considered a satisfiable clustering result. Data scientists need adequate interactive tools to effectively explore and navigate the large clustering space so as to improve the effectiveness of exploratory clustering analysis. We introduce Clustrophile 2, a new interactive tool for guided clustering analysis. Clustrophile 2 guides users in clustering-based exploratory analysis, adapts user feedback to improve user guidance, facilitates the interpretation of clusters, and helps quickly reason about differences between clusterings. To this end, Clustrophile 2 contributes a novel feature, the Clustering Tour, to help users choose clustering parameters and assess the quality of different clustering results in relation to current analysis goals and user expectations. We evaluate Clustrophile 2 through a user study with 12 data scientists, who used our tool to explore and interpret sub-cohorts in a dataset of Parkinson's disease patients. Results suggest that Clustrophile 2 improves the speed and effectiveness of exploratory clustering analysis for both experts and non-experts.", "abstracts": [ { "abstractType": "Regular", "content": "Data clustering is a common unsupervised learning method frequently used in exploratory data analysis. However, identifying relevant structures in unlabeled, high-dimensional data is nontrivial, requiring iterative experimentation with clustering parameters as well as data features and instances. The number of possible clusterings for a typical dataset is vast, and navigating in this vast space is also challenging. The absence of ground-truth labels makes it impossible to define an optimal solution, thus requiring user judgment to establish what can be considered a satisfiable clustering result. Data scientists need adequate interactive tools to effectively explore and navigate the large clustering space so as to improve the effectiveness of exploratory clustering analysis. We introduce Clustrophile 2, a new interactive tool for guided clustering analysis. Clustrophile 2 guides users in clustering-based exploratory analysis, adapts user feedback to improve user guidance, facilitates the interpretation of clusters, and helps quickly reason about differences between clusterings. To this end, Clustrophile 2 contributes a novel feature, the Clustering Tour, to help users choose clustering parameters and assess the quality of different clustering results in relation to current analysis goals and user expectations. We evaluate Clustrophile 2 through a user study with 12 data scientists, who used our tool to explore and interpret sub-cohorts in a dataset of Parkinson's disease patients. Results suggest that Clustrophile 2 improves the speed and effectiveness of exploratory clustering analysis for both experts and non-experts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data clustering is a common unsupervised learning method frequently used in exploratory data analysis. However, identifying relevant structures in unlabeled, high-dimensional data is nontrivial, requiring iterative experimentation with clustering parameters as well as data features and instances. The number of possible clusterings for a typical dataset is vast, and navigating in this vast space is also challenging. The absence of ground-truth labels makes it impossible to define an optimal solution, thus requiring user judgment to establish what can be considered a satisfiable clustering result. Data scientists need adequate interactive tools to effectively explore and navigate the large clustering space so as to improve the effectiveness of exploratory clustering analysis. We introduce Clustrophile 2, a new interactive tool for guided clustering analysis. Clustrophile 2 guides users in clustering-based exploratory analysis, adapts user feedback to improve user guidance, facilitates the interpretation of clusters, and helps quickly reason about differences between clusterings. To this end, Clustrophile 2 contributes a novel feature, the Clustering Tour, to help users choose clustering parameters and assess the quality of different clustering results in relation to current analysis goals and user expectations. We evaluate Clustrophile 2 through a user study with 12 data scientists, who used our tool to explore and interpret sub-cohorts in a dataset of Parkinson's disease patients. Results suggest that Clustrophile 2 improves the speed and effectiveness of exploratory clustering analysis for both experts and non-experts.", "title": "Clustrophile 2: Guided Visual Clustering Analysis", "normalizedTitle": "Clustrophile 2: Guided Visual Clustering Analysis", "fno": "08440035", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Visualisation", "Diseases", "Pattern Clustering", "Statistical Analysis", "Unsupervised Learning", "Clustering Parameters", "Data Features", "User Judgment", "Clustering Based Exploratory Analysis", "User Feedback", "User Guidance", "User Expectations", "Guided Visual Clustering Analysis", "Data Clustering", "High Dimensional Data Analysis", "Interactive Tools", "Data Scientists", "Unsupervised Learning Method", "Clustering Tour", "Clustrophile", "Optimal Solution", "Iterative Experimentation", "Ground Truth Labels", "Parkinsons Disease Patients Dataset", "Tools", "Data Visualization", "Visualization", "Clustering Algorithms", "Data Analysis", "Space Exploration", "Dimensionality Reduction", "Clustering Tour", "Guided Data Analysis", "Exploratory Data Analysis", "Interactive Clustering Analysis", "Interpretability", "Explainability", "Visual Data Exploration Recommendation", "Dimensionality Reduction", "What If Analysis", "Clustrophile", "Unsupervised Learning" ], "authors": [ { "givenName": "Marco", "surname": "Cavallo", "fullName": "Marco Cavallo", "affiliation": "IBM Research", "__typename": "ArticleAuthorType" }, { "givenName": "Çağatay", "surname": "Demiralp", "fullName": "Çağatay Demiralp", "affiliation": "MIT CSAIL & Fitnescity Labs", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2019-01-01 00:00:00", "pubType": "trans", "pages": "267-276", "year": "2019", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ichit/2006/2674/2/267420542", "title": "Performance Analysis of 2-tier Clustering", "doi": null, "abstractUrl": "/proceedings-article/ichit/2006/267420542/12OmNAYoKhU", "parentPublication": { "id": "proceedings/ichit/2006/2674/2", "title": "2006 International Conference on Hybrid Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichit/2006/2674/2/04021264", "title": "Performance Analysis of 2-tier Clustering", "doi": null, "abstractUrl": "/proceedings-article/ichit/2006/04021264/12OmNBQ2VP6", "parentPublication": { "id": "proceedings/ichit/2006/2674/2", "title": "2006 International Conference on Hybrid Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2004/2173/0/21730301", "title": "A Method for Evaluating the Quality of String Dissimilarity Measures and Clustering Algorithms for EST Clustering", "doi": null, "abstractUrl": "/proceedings-article/bibe/2004/21730301/12OmNC8uRlz", "parentPublication": { "id": "proceedings/bibe/2004/2173/0", "title": "Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'04)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2000/6478/0/64780006", "title": "H-BLOB: A Hierarchical Visual Clustering Method Using Implicit Surfaces", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780006/12OmNxb5hsP", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004024", "title": "Visual Clustering of Spam Emails for DDoS Analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004024/12OmNxveNLS", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2013/3142/0/3143a750", "title": "Optimal Correlation Clustering via MaxSAT", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2013/3143a750/12OmNy5hRlB", "parentPublication": { "id": "proceedings/icdmw/2013/3142/0", "title": "2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020413", "title": "Skew-Symmetric Adjacency Matrices for Clustering Directed Graphs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020413/1KfRNJ45ri0", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a228", "title": "User-guided Dimensionality Reduction Ensembles", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a228/1cMF9VUpFgA", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/10/09094378", "title": "Interactive Steering of Hierarchical Clustering", "doi": null, "abstractUrl": "/journal/tg/2021/10/09094378/1jQNru4p18k", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/01/09146191", "title": "Visual Analysis of Class Separations With Locally Linear Segments", "doi": null, "abstractUrl": "/journal/tg/2021/01/09146191/1lFEXEfCDg4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08440838", "articleId": "17D45Wt3Exw", "__typename": "AdjacentArticleType" }, "next": { "fno": "08440848", "articleId": "17D45WXIkG7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgKN", "name": "ttg201901-08440035s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201901-08440035s1.zip", "extension": "zip", "size": "134 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1oa15tKyG9W", "doi": "10.1109/TVCG.2020.3030347", "abstract": "We propose a new approach-called PK-clustering-to help social scientists create meaningful clusters in social networks. Many clustering algorithms exist but most social scientists find them difficult to understand, and tools do not provide any guidance to choose algorithms, or to evaluate results taking into account the prior knowledge of the scientists. Our work introduces a new clustering approach and a visual analytics user interface that address this issue. It is based on a process that 1) captures the prior knowledge of the scientists as a set of incomplete clusters, 2) runs multiple clustering algorithms (similarly to clustering ensemble methods), 3) visualizes the results of all the algorithms ranked and summarized by how well each algorithm matches the prior knowledge, 4) evaluates the consensus between user-selected algorithms and 5) allows users to review details and iteratively update the acquired knowledge. We describe our approach using an initial functional prototype, then provide two examples of use and early feedback from social scientists. We believe our clustering approach offers a novel constructive method to iteratively build knowledge while avoiding being overly influenced by the results of often randomly selected black-box clustering algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a new approach-called PK-clustering-to help social scientists create meaningful clusters in social networks. Many clustering algorithms exist but most social scientists find them difficult to understand, and tools do not provide any guidance to choose algorithms, or to evaluate results taking into account the prior knowledge of the scientists. Our work introduces a new clustering approach and a visual analytics user interface that address this issue. It is based on a process that 1) captures the prior knowledge of the scientists as a set of incomplete clusters, 2) runs multiple clustering algorithms (similarly to clustering ensemble methods), 3) visualizes the results of all the algorithms ranked and summarized by how well each algorithm matches the prior knowledge, 4) evaluates the consensus between user-selected algorithms and 5) allows users to review details and iteratively update the acquired knowledge. We describe our approach using an initial functional prototype, then provide two examples of use and early feedback from social scientists. We believe our clustering approach offers a novel constructive method to iteratively build knowledge while avoiding being overly influenced by the results of often randomly selected black-box clustering algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a new approach-called PK-clustering-to help social scientists create meaningful clusters in social networks. Many clustering algorithms exist but most social scientists find them difficult to understand, and tools do not provide any guidance to choose algorithms, or to evaluate results taking into account the prior knowledge of the scientists. Our work introduces a new clustering approach and a visual analytics user interface that address this issue. It is based on a process that 1) captures the prior knowledge of the scientists as a set of incomplete clusters, 2) runs multiple clustering algorithms (similarly to clustering ensemble methods), 3) visualizes the results of all the algorithms ranked and summarized by how well each algorithm matches the prior knowledge, 4) evaluates the consensus between user-selected algorithms and 5) allows users to review details and iteratively update the acquired knowledge. We describe our approach using an initial functional prototype, then provide two examples of use and early feedback from social scientists. We believe our clustering approach offers a novel constructive method to iteratively build knowledge while avoiding being overly influenced by the results of often randomly selected black-box clustering algorithms.", "title": "Integrating Prior Knowledge in Mixed-Initiative Social Network Clustering", "normalizedTitle": "Integrating Prior Knowledge in Mixed-Initiative Social Network Clustering", "fno": "09237999", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Visualisation", "Pattern Clustering", "Social Networking Online", "User Interfaces", "Approach Called PK Clustering To", "Social Scientists", "Meaningful Clusters", "Social Networks", "Clustering Algorithms Exist", "Clustering Approach", "Visual Analytics User Interface", "Incomplete Clusters", "User Selected Algorithms", "Acquired Knowledge", "Black Box Clustering Algorithms", "Mixed Initiative Social Network Clustering", "Clustering Algorithms", "Social Networking Online", "Tools", "Visualization", "Heuristic Algorithms", "Clustering Methods", "Inference Algorithms", "Social Network Analysis", "Network Visualization", "Clustering", "Mixed Initiative", "Prior Knowledge", "User Interface" ], "authors": [ { "givenName": "Alexis", "surname": "Pister", "fullName": "Alexis Pister", "affiliation": "Université Paris-Saclay, CNRS, Inria, LRI, France", "__typename": "ArticleAuthorType" }, { "givenName": "Paolo", "surname": "Buono", "fullName": "Paolo Buono", "affiliation": "University of Bari, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Jean-Daniel", "surname": "Fekete", "fullName": "Jean-Daniel Fekete", "affiliation": "Université Paris-Saclay, CNRS, Inria, LRI, France", "__typename": "ArticleAuthorType" }, { "givenName": "Catherine", "surname": "Plaisant", "fullName": "Catherine Plaisant", "affiliation": "Université Paris-Saclay, CNRS, Inria, LRI, France", "__typename": "ArticleAuthorType" }, { "givenName": "Paola", "surname": "Valdivia", "fullName": "Paola Valdivia", "affiliation": "Université Paris-Saclay, CNRS, Inria, LRI, France", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "1775-1785", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iisa/2022/6390/0/09904383", "title": "Lifting the Curse: Exploring Dimensionality Reduction on Text Clustering Applications", "doi": null, "abstractUrl": "/proceedings-article/iisa/2022/09904383/1H5KrbTZVG8", "parentPublication": { "id": "proceedings/iisa/2022/6390/0", "title": "2022 13th International Conference on Information, Intelligence, Systems & Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2022/5478/0/547800a277", "title": "An Incremental Clustering Algorithm Based on CFS", "doi": null, "abstractUrl": "/proceedings-article/icdh/2022/547800a277/1JeDqQ5EViM", "parentPublication": { "id": "proceedings/icdh/2022/5478/0", "title": "2022 9th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400a256", "title": "Efficient and Incremental Clustering Algorithms on Star-Schema Heterogeneous Graphs", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400a256/1aDSZjvtQWY", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipccc/2018/6808/0/08710844", "title": "Privacy Preserving Online Social Networks using Enhanced Equicardinal Clustering", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2018/08710844/1axfFMRsFOg", "parentPublication": { "id": "proceedings/ipccc/2018/6808/0", "title": "2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0/205800a718", "title": "Neighborhood Graph Embedding for Nodes Clustering of Social Network", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2019/205800a718/1dPouNqfHnW", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0", "title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a007", "title": "Point-of-Interest Recommendation Based on Spatial Clustering in LBSN", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a007/1dUo442wahq", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09309404", "title": "Efficient Distributed Clustering Algorithms on Star-Schema Heterogeneous Graphs", "doi": null, "abstractUrl": "/journal/tk/2022/10/09309404/1pVCNY3BxUA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0/148500a505", "title": "Effectively Explaining Missing Nodes on Structural Graph Clustering", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2020/148500a505/1ua4trgtIhW", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0", "title": "2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0/148500a529", "title": "Effectively Incremental Structural Graph Clustering for Dynamic Parameter", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2020/148500a529/1ua4xqxEoEw", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0", "title": "2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0/357400a814", "title": "Robust Social Event Detection via Deep Clustering", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2021/357400a814/1zxLk54LLaM", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0", "title": "2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09241744", "articleId": "1oijOjuyCNq", "__typename": "AdjacentArticleType" }, "next": { "fno": "09228893", "articleId": "1nYqgO1jK8w", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qLaZIHwf5u", "name": "ttg202102-09237999s1-supp3-3030347.csv", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09237999s1-supp3-3030347.csv", "extension": "csv", "size": "105 kB", "__typename": "WebExtraType" }, { "id": "1qLaZOL3yaQ", "name": "ttg202102-09237999s1-supp1-3030347.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09237999s1-supp1-3030347.pdf", "extension": "pdf", "size": "1.94 MB", "__typename": "WebExtraType" }, { "id": "1qLaZBG5zyw", "name": "ttg202102-09237999s1-supp2-3030347.csv", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09237999s1-supp2-3030347.csv", "extension": "csv", "size": "19.8 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNxI0KAN", "title": "May", "year": "2014", "issueNum": "05", "idPrefix": "tp", "pubType": "journal", "volume": "36", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwbaqW2", "doi": "10.1109/TPAMI.2013.159", "abstract": "We consider the problem of learning a forest of nonlinear decision rules with general loss functions. The standard methods employ boosted decision trees such as Adaboost for exponential loss and Friedman's gradient boosting for general loss. In contrast to these traditional boosting algorithms that treat a tree learner as a black box, the method we propose directly learns decision forests via fully-corrective regularized greedy search using the underlying forest structure. Our method achieves higher accuracy and smaller models than gradient boosting on many of the datasets we have tested on.", "abstracts": [ { "abstractType": "Regular", "content": "We consider the problem of learning a forest of nonlinear decision rules with general loss functions. The standard methods employ boosted decision trees such as Adaboost for exponential loss and Friedman's gradient boosting for general loss. In contrast to these traditional boosting algorithms that treat a tree learner as a black box, the method we propose directly learns decision forests via fully-corrective regularized greedy search using the underlying forest structure. Our method achieves higher accuracy and smaller models than gradient boosting on many of the datasets we have tested on.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We consider the problem of learning a forest of nonlinear decision rules with general loss functions. The standard methods employ boosted decision trees such as Adaboost for exponential loss and Friedman's gradient boosting for general loss. In contrast to these traditional boosting algorithms that treat a tree learner as a black box, the method we propose directly learns decision forests via fully-corrective regularized greedy search using the underlying forest structure. Our method achieves higher accuracy and smaller models than gradient boosting on many of the datasets we have tested on.", "title": "Learning Nonlinear Functions Using Regularized Greedy Forest", "normalizedTitle": "Learning Nonlinear Functions Using Regularized Greedy Forest", "fno": "06583153", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Nonlinear Functions", "Decision Trees", "Greedy Algorithms", "Learning Artificial Intelligence", "Fully Corrective Regularized Greedy Search", "Nonlinear Functions Learning", "Regularized Greedy Forest", "Nonlinear Decision Rule", "General Loss Function", "Boosted Decision Tree", "Boosting Algorithm", "Tree Learner", "Black Box", "Decision Forest", "Boosting", "Decision Trees", "Vegetation", "Additives", "Tuning", "Greedy Algorithms", "Vectors", "Greedy Algorithm", "Boosting", "Decision Tree", "Decision Forest", "Ensemble", "Greedy Algorithm", "Boosting", "Decision Tree", "Decision Forest", "Ensemble" ], "authors": [ { "givenName": "Rie", "surname": "Johnson", "fullName": "Rie Johnson", "affiliation": "RJ Res. Consulting, Tarrytown, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": null, "surname": "Tong Zhang", "fullName": "Tong Zhang", "affiliation": "Stat. Dept., Rutgers Univ., Piscataway, NJ, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2014-05-01 00:00:00", "pubType": "trans", "pages": "942-954", "year": "2014", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/dsc/2018/4210/0/421001a153", "title": "Webshell Detection Based on Random Forest–Gradient Boosting Decision Tree Algorithm", "doi": null, "abstractUrl": "/proceedings-article/dsc/2018/421001a153/12OmNqJq4Gk", "parentPublication": { "id": "proceedings/dsc/2018/4210/0", "title": "2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999193", "title": "Network-constrained forest for regularized omics data classification", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999193/12OmNrJ11E3", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2015/6683/0/6683a442", "title": "Sequential Boosting for Learning a Random Forest Classifier", "doi": null, "abstractUrl": "/proceedings-article/wacv/2015/6683a442/12OmNvvLi3V", "parentPublication": { "id": "proceedings/wacv/2015/6683/0", "title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2016/5698/0/07907533", "title": "Random Forest for Salary Prediction System to Improve Students' Motivation", "doi": null, "abstractUrl": "/proceedings-article/sitis/2016/07907533/12OmNx0A7C5", "parentPublication": { "id": "proceedings/sitis/2016/5698/0", "title": "2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cine/2016/0451/0/0451a160", "title": "Performance Analysis of Ensemble Supervised Machine Learning Algorithms for Missing Value Imputation", "doi": null, "abstractUrl": "/proceedings-article/cine/2016/0451a160/12OmNzdoN1x", "parentPublication": { "id": "proceedings/cine/2016/0451/0", "title": "2016 2nd International Conference on Computational Intelligence and Networks (CINE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2011/02/ttp2011020294", "title": "Cost-Sensitive Boosting", "doi": null, "abstractUrl": "/journal/tp/2011/02/ttp2011020294/13rRUwInvma", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08257910", "title": "Compact multi-class boosted trees", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08257910/17D45W9KVKo", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a950", "title": "Improving Robustness of Random Forest Under Label Noise", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a950/18j8M9lA4Vi", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scset/2022/7876/0/787600a227", "title": "A New Forest Fire Risk Rating Forecast Model Based on XGBoost", "doi": null, "abstractUrl": "/proceedings-article/scset/2022/787600a227/1ANLSpt0oF2", "parentPublication": { "id": "proceedings/scset/2022/7876/0", "title": "2022 International Seminar on Computer Science and Engineering Technology (SCSET)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2023/01/09645204", "title": "Gradient Boosted Neural Decision Forest", "doi": null, "abstractUrl": "/journal/sc/2023/01/09645204/1zc6vCCD5QI", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06620871", "articleId": "13rRUwh80CC", "__typename": "AdjacentArticleType" }, "next": { "fno": "06809253", "articleId": "13rRUNvyamb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxI0KAO", "title": "Feb.", "year": "2015", "issueNum": "02", "idPrefix": "tc", "pubType": "journal", "volume": "64", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwgQpqa", "doi": "10.1109/TC.2013.227", "abstract": "Binary search on levels (BSOL) is a decision-tree algorithm for packet classification with superior speed performance. However, the most decision-tree-based algorithms, like BSOL, may suffer from a memory explosion problem caused by filter replications. In this work, we improve the storage performance of BSOL by employing a scheme, replication control. Our scheme dynamically generates multiple decision trees to eliminate filter replications in BSOL. The experimental results show that the new scheme achieves better performance than the existing decision-tree-based algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "Binary search on levels (BSOL) is a decision-tree algorithm for packet classification with superior speed performance. However, the most decision-tree-based algorithms, like BSOL, may suffer from a memory explosion problem caused by filter replications. In this work, we improve the storage performance of BSOL by employing a scheme, replication control. Our scheme dynamically generates multiple decision trees to eliminate filter replications in BSOL. The experimental results show that the new scheme achieves better performance than the existing decision-tree-based algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Binary search on levels (BSOL) is a decision-tree algorithm for packet classification with superior speed performance. However, the most decision-tree-based algorithms, like BSOL, may suffer from a memory explosion problem caused by filter replications. In this work, we improve the storage performance of BSOL by employing a scheme, replication control. Our scheme dynamically generates multiple decision trees to eliminate filter replications in BSOL. The experimental results show that the new scheme achieves better performance than the existing decision-tree-based algorithms.", "title": "Packet Classification Using Dynamically Generated Decision Trees", "normalizedTitle": "Packet Classification Using Dynamically Generated Decision Trees", "fno": "06684143", "hasPdf": true, "idPrefix": "tc", "keywords": [ "Decision Trees", "Internet", "Packet Switching", "Telecommunication Network Routing", "Replication Control", "Filter Replications", "Memory Explosion Problem", "Superior Speed Performance", "BSOL", "Binary Search On Levels", "Dynamically Generated Decision Tree Algorithm", "Packet Classification", "Decision Trees", "Memory Management", "Vegetation", "IP Networks", "Hardware", "Heuristic Algorithms", "Software Algorithms", "Packet Classification", "Firewalls", "Qo S", "Packet Forwarding" ], "authors": [ { "givenName": "Yu-Chieh", "surname": "Cheng", "fullName": "Yu-Chieh Cheng", "affiliation": "Department of Computer Science and Engineering, National Chung Hsing University, Taichung, Taiwan", "__typename": "ArticleAuthorType" }, { "givenName": "Pi-Chung", "surname": "Wang", "fullName": "Pi-Chung Wang", "affiliation": "Department of Computer Science and Engineering, National Chung Hsing University, Taichung, Taiwan", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2015-02-01 00:00:00", "pubType": "trans", "pages": "582-586", "year": "2015", "issn": "0018-9340", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ictai/2017/3876/0/387601a905", "title": "Decision Stream: Cultivating Deep Decision Trees", "doi": null, "abstractUrl": "/proceedings-article/ictai/2017/387601a905/12OmNxdVgKi", "parentPublication": { "id": "proceedings/ictai/2017/3876/0", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/05/06574846", "title": "Random Projection Random Discretization Ensembles—Ensembles of Linear Multivariate Decision Trees", "doi": null, "abstractUrl": "/journal/tk/2014/05/06574846/13rRUxC0SWA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019878", "title": "TreePOD: Sensitivity-Aware Selection of Pareto-Optimal Decision Trees", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019878/13rRUxYINfl", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2007/06/t0769", "title": "Dynamic Segment Trees for Ranges and Prefixes", "doi": null, "abstractUrl": "/journal/tc/2007/06/t0769/13rRUygBw6u", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2018/7449/0/744900a401", "title": "Inducing Readable Oblique Decision Trees", "doi": null, "abstractUrl": "/proceedings-article/ictai/2018/744900a401/17D45WYQJ7j", "parentPublication": { "id": "proceedings/ictai/2018/7449/0", "title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2018/7449/0/744900a527", "title": "Random Forests with Stochastic Induction of Decision Trees", "doi": null, "abstractUrl": "/proceedings-article/ictai/2018/744900a527/17D45Xq6dB5", "parentPublication": { "id": "proceedings/ictai/2018/7449/0", "title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlbdbi/2021/1790/0/179000a280", "title": "Decision Trees for Objective House Price Prediction", "doi": null, "abstractUrl": "/proceedings-article/mlbdbi/2021/179000a280/1BQiv9iW0cE", "parentPublication": { "id": "proceedings/mlbdbi/2021/1790/0", "title": "2021 3rd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2022/2055/0/205500a920", "title": "Properly learning decision trees in almost polynomial time", "doi": null, "abstractUrl": "/proceedings-article/focs/2022/205500a920/1BtfC9ACPdu", "parentPublication": { "id": "proceedings/focs/2022/2055/0", "title": "2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/5555/01/09982296", "title": "TupleTree: A High-Performance Packet Classification Algorithm Supporting Fast Rule-Set Updates", "doi": null, "abstractUrl": "/journal/nt/5555/01/09982296/1J2SZQxTcju", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2019/4253/0/425300a132", "title": "Online Local Boosting: Improving Performance in Online Decision Trees", "doi": null, "abstractUrl": "/proceedings-article/bracis/2019/425300a132/1fHkFnNqR6o", "parentPublication": { "id": "proceedings/bracis/2019/4253/0", "title": "2019 8th Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06671597", "articleId": "13rRUwfI0PD", "__typename": "AdjacentArticleType" }, "next": { "fno": "06658757", "articleId": "13rRUIM2VGt", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzFMFo6", "title": "December", "year": "1999", "issueNum": "12", "idPrefix": "tp", "pubType": "journal", "volume": "21", "label": "December", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxlgxUk", "doi": "10.1109/34.817409", "abstract": "Abstract—A fuzzy decision tree is constructed by allowing the possibility of partial membership of a point in the nodes that make up the tree structure. This extension of its expressive capabilities transforms the decision tree into a powerful functional approximant that incorporates features of connectionist methods, while remaining easily interpretable. Fuzzification is achieved by superimposing a fuzzy structure over the skeleton of a CART decision tree. A training rule for fuzzy trees, similar to backpropagation in neural networks, is designed. This rule corresponds to a global optimization algorithm that fixes the parameters of the fuzzy splits. The method developed for the automatic generation of fuzzy decision trees is applied to both classification and regression problems. In regression problems, it is seen that the continuity constraint imposed by the function representation of the fuzzy tree leads to substantial improvements in the quality of the regression and limits the tendency to overfitting. In classification, fuzzification provides a means of uncovering the structure of the probability distribution for the classification errors in attribute space. This allows the identification of regions for which the error rate of the tree is significantly lower than the average error rate, sometimes even below the Bayes misclassification rate.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—A fuzzy decision tree is constructed by allowing the possibility of partial membership of a point in the nodes that make up the tree structure. This extension of its expressive capabilities transforms the decision tree into a powerful functional approximant that incorporates features of connectionist methods, while remaining easily interpretable. Fuzzification is achieved by superimposing a fuzzy structure over the skeleton of a CART decision tree. A training rule for fuzzy trees, similar to backpropagation in neural networks, is designed. This rule corresponds to a global optimization algorithm that fixes the parameters of the fuzzy splits. The method developed for the automatic generation of fuzzy decision trees is applied to both classification and regression problems. In regression problems, it is seen that the continuity constraint imposed by the function representation of the fuzzy tree leads to substantial improvements in the quality of the regression and limits the tendency to overfitting. In classification, fuzzification provides a means of uncovering the structure of the probability distribution for the classification errors in attribute space. This allows the identification of regions for which the error rate of the tree is significantly lower than the average error rate, sometimes even below the Bayes misclassification rate.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—A fuzzy decision tree is constructed by allowing the possibility of partial membership of a point in the nodes that make up the tree structure. This extension of its expressive capabilities transforms the decision tree into a powerful functional approximant that incorporates features of connectionist methods, while remaining easily interpretable. Fuzzification is achieved by superimposing a fuzzy structure over the skeleton of a CART decision tree. A training rule for fuzzy trees, similar to backpropagation in neural networks, is designed. This rule corresponds to a global optimization algorithm that fixes the parameters of the fuzzy splits. The method developed for the automatic generation of fuzzy decision trees is applied to both classification and regression problems. In regression problems, it is seen that the continuity constraint imposed by the function representation of the fuzzy tree leads to substantial improvements in the quality of the regression and limits the tendency to overfitting. In classification, fuzzification provides a means of uncovering the structure of the probability distribution for the classification errors in attribute space. This allows the identification of regions for which the error rate of the tree is significantly lower than the average error rate, sometimes even below the Bayes misclassification rate.", "title": "Globally Optimal Fuzzy Decision Trees for Classification and Regression", "normalizedTitle": "Globally Optimal Fuzzy Decision Trees for Classification and Regression", "fno": "i1297", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Automatic Learning", "Decision Trees", "Fuzzy Set Theory", "Global Optimization", "Backpropagation", "Nonparametric Regression", "Classification" ], "authors": [ { "givenName": "Alberto", "surname": "Suárez", "fullName": "Alberto Suárez", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "James F.", "surname": "Lutsko", "fullName": "James F. Lutsko", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "12", "pubDate": "1999-12-01 00:00:00", "pubType": "trans", "pages": "1297-1311", "year": "1999", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "i1280", "articleId": "13rRUygT7z1", "__typename": "AdjacentArticleType" }, "next": { "fno": "i1312", "articleId": "13rRUxASuTV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNApu5xI", "title": "August", "year": "2006", "issueNum": "08", "idPrefix": "tk", "pubType": "journal", "volume": "18", "label": "August", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUy2YLYT", "doi": "10.1109/TKDE.2006.127", "abstract": "This paper introduces orthogonal decision trees that offer an effective way to construct a redundancy-free, accurate, and meaningful representation of large decision-tree-ensembles often created by popular techniques such as Bagging, Boosting, Random Forests, and many distributed and data stream mining algorithms. Orthogonal decision trees are functionally orthogonal to each other and they correspond to the principal components of the underlying function space. This paper offers a technique to construct such trees based on the Fourier transformation of decision trees and eigen-analysis of the ensemble in the Fourier representation. It offers experimental results to document the performance of orthogonal trees on the grounds of accuracy and model complexity.", "abstracts": [ { "abstractType": "Regular", "content": "This paper introduces orthogonal decision trees that offer an effective way to construct a redundancy-free, accurate, and meaningful representation of large decision-tree-ensembles often created by popular techniques such as Bagging, Boosting, Random Forests, and many distributed and data stream mining algorithms. Orthogonal decision trees are functionally orthogonal to each other and they correspond to the principal components of the underlying function space. This paper offers a technique to construct such trees based on the Fourier transformation of decision trees and eigen-analysis of the ensemble in the Fourier representation. It offers experimental results to document the performance of orthogonal trees on the grounds of accuracy and model complexity.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper introduces orthogonal decision trees that offer an effective way to construct a redundancy-free, accurate, and meaningful representation of large decision-tree-ensembles often created by popular techniques such as Bagging, Boosting, Random Forests, and many distributed and data stream mining algorithms. Orthogonal decision trees are functionally orthogonal to each other and they correspond to the principal components of the underlying function space. This paper offers a technique to construct such trees based on the Fourier transformation of decision trees and eigen-analysis of the ensemble in the Fourier representation. It offers experimental results to document the performance of orthogonal trees on the grounds of accuracy and model complexity.", "title": "Orthogonal Decision Trees", "normalizedTitle": "Orthogonal Decision Trees", "fno": "k1028", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Orthogonal Decision Trees", "Redundancy Free Trees", "Principle Component Analysis", "Fourier Transform" ], "authors": [ { "givenName": "Hillol", "surname": "Kargupta", "fullName": "Hillol Kargupta", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Byung-Hoon", "surname": "Park", "fullName": "Byung-Hoon Park", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Haimonti", "surname": "Dutta", "fullName": "Haimonti Dutta", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "08", "pubDate": "2006-08-01 00:00:00", "pubType": "trans", "pages": "1028-1042", "year": "2006", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2012/4905/0/4905a339", "title": "ConfDTree: Improving Decision Trees Using Confidence Intervals", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905a339/12OmNCbkQBs", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2000/0909/0/09090040", "title": "Knowledge pruning in decision trees", "doi": null, "abstractUrl": "/proceedings-article/ictai/2000/09090040/12OmNwKGAmQ", "parentPublication": { "id": "proceedings/ictai/2000/0909/0", "title": "Proceedings 12th IEEE Internationals Conference on Tools with Artificial Intelligence. ICTAI 2000", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isda/2008/3382/3/3382c346", "title": "Subpixel Edge Location Using Orthogonal Fourier-Mellin Moments Based Edge Location Error Compensation Model", "doi": null, "abstractUrl": "/proceedings-article/isda/2008/3382c346/12OmNx0RIKR", "parentPublication": { "id": "proceedings/isda/2008/3382/3", "title": "Intelligent Systems Design and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2001/1119/0/11190281", "title": "Mining Decision Trees from Data Streams in a Mobile Environment", "doi": null, "abstractUrl": "/proceedings-article/icdm/2001/11190281/12OmNz3bdJs", "parentPublication": { "id": "proceedings/icdm/2001/1119/0", "title": "Proceedings 2001 IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/1999/0456/0/04560091", "title": "HOT: Heuristics for Oblique Trees", "doi": null, "abstractUrl": "/proceedings-article/ictai/1999/04560091/12OmNzUPpzD", "parentPublication": { "id": "proceedings/ictai/1999/0456/0", "title": "Proceedings 11th International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/2/3119b694", "title": "Application of the Complete Orthogonal V-system", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119b694/12OmNzcxZsU", "parentPublication": { "id": "proceedings/cisp/2008/3119/3", "title": "Image and Signal Processing, Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2004/02/k0216", "title": "A Fourier Spectrum-Based Approach to Represent Decision Trees for Mining Data Streams in Mobile Environments", "doi": null, "abstractUrl": "/journal/tk/2004/02/k0216/13rRUwgQpqV", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1983/06/01676279", "title": "Efficient VLSI Networks for Parallel Processing Based on Orthogonal Trees", "doi": null, "abstractUrl": "/journal/tc/1983/06/01676279/13rRUwjXZRa", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1979/02/01675304", "title": "A Generalized Orthogonal Transformation Matrix", "doi": null, "abstractUrl": "/journal/tc/1979/02/01675304/13rRUyfKIGt", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "k1010", "articleId": "13rRUNvgyWL", "__typename": "AdjacentArticleType" }, "next": { "fno": "k1043", "articleId": "13rRUxjyX4i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzUgdjK", "title": "July-Aug.", "year": "2018", "issueNum": "04", "idPrefix": "tb", "pubType": "journal", "volume": "15", "label": "July-Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUy0qnCf", "doi": "10.1109/TCBB.2018.2812195", "abstract": "Thanks to rule-based modelling languages, we can assemble large sets of mechanistic protein-protein interactions within integrated models. Our goal would be to understand how the behavior of these systems emerges from these low-level interactions. Yet, this is a quite long term challenge and it is desirable to offer intermediary levels of abstraction, so as to get a better understanding of the models and to increase our confidence within our mechanistic assumptions. To this extend, static analysis can be used to derive various abstractions of the semantics, each of them offering new perspectives on the models. We propose an abstract interpretation of the behavior of each protein, in isolation. Given a model written in Kappa, this abstraction computes for each kind of proteins a transition system that describes which conformations this protein may take and how a protein may pass from one conformation to another one. Then, we use simplicial complexes to abstract away the interleaving order of the transformations between conformations that commute. As a result, we get a compact summary of the potential behavior of each protein of the model.", "abstracts": [ { "abstractType": "Regular", "content": "Thanks to rule-based modelling languages, we can assemble large sets of mechanistic protein-protein interactions within integrated models. Our goal would be to understand how the behavior of these systems emerges from these low-level interactions. Yet, this is a quite long term challenge and it is desirable to offer intermediary levels of abstraction, so as to get a better understanding of the models and to increase our confidence within our mechanistic assumptions. To this extend, static analysis can be used to derive various abstractions of the semantics, each of them offering new perspectives on the models. We propose an abstract interpretation of the behavior of each protein, in isolation. Given a model written in Kappa, this abstraction computes for each kind of proteins a transition system that describes which conformations this protein may take and how a protein may pass from one conformation to another one. Then, we use simplicial complexes to abstract away the interleaving order of the transformations between conformations that commute. As a result, we get a compact summary of the potential behavior of each protein of the model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Thanks to rule-based modelling languages, we can assemble large sets of mechanistic protein-protein interactions within integrated models. Our goal would be to understand how the behavior of these systems emerges from these low-level interactions. Yet, this is a quite long term challenge and it is desirable to offer intermediary levels of abstraction, so as to get a better understanding of the models and to increase our confidence within our mechanistic assumptions. To this extend, static analysis can be used to derive various abstractions of the semantics, each of them offering new perspectives on the models. We propose an abstract interpretation of the behavior of each protein, in isolation. Given a model written in Kappa, this abstraction computes for each kind of proteins a transition system that describes which conformations this protein may take and how a protein may pass from one conformation to another one. Then, we use simplicial complexes to abstract away the interleaving order of the transformations between conformations that commute. As a result, we get a compact summary of the potential behavior of each protein of the model.", "title": "Local Traces: An Over-Approximation of the Behavior of the Proteins in Rule-Based Models", "normalizedTitle": "Local Traces: An Over-Approximation of the Behavior of the Proteins in Rule-Based Models", "fno": "08306662", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Proteins", "Receptor Biochemistry", "Biological System Modeling", "Computational Modeling", "Static Analysis", "Semantics", "Analytical Models", "Rule Based Modelling", "Systems Biology", "Concurrency", "Static Analysis", "Abstract Interpretation" ], "authors": [ { "givenName": "Jérôme", "surname": "Feret", "fullName": "Jérôme Feret", "affiliation": "DI - ENS, INRIA Paris, Paris, France", "__typename": "ArticleAuthorType" }, { "givenName": "Kim Quyên", "surname": "Lý", "fullName": "Kim Quyên Lý", "affiliation": "DI - ENS, INRIA Paris, Paris, France", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2018-07-01 00:00:00", "pubType": "trans", "pages": "1124-1137", "year": "2018", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccabs/2013/0716/0/06629199", "title": "Computational prediction of hinge axes in proteins", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2013/06629199/12OmNwqft18", "parentPublication": { "id": "proceedings/iccabs/2013/0716/0", "title": "2013 IEEE 3rd International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2011/1799/0/06120418", "title": "Populating Local Minima in the Protein Conformational Space", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120418/12OmNywfKDA", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/01/ttb2012010240", "title": "Residues with Similar Hexagon Neighborhoods Share Similar Side-Chain Conformations", "doi": null, "abstractUrl": "/journal/tb/2012/01/ttb2012010240/13rRUwhpBMS", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/04/08606950", "title": "nAPOLI: A Graph-Based Strategy to Detect and Visualize Conserved Protein-Ligand Interactions in Large-Scale", "doi": null, "abstractUrl": "/journal/tb/2020/04/08606950/17D45W9KVHi", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669537", "title": "Medication Rule and Mechanism of Action for the Treatment of Polycystic Ovary Syndrome Based on Data Mining and Network Pharmacology", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669537/1A9VYMWaIz6", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/01/09684983", "title": "CPInformer for Efficient and Robust Compound-Protein Interaction Prediction", "doi": null, "abstractUrl": "/journal/tb/2023/01/09684983/1Ai9rokZqoM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995019", "title": "A geometric and topological analysis of the binding behavior of Intrinsically Disordered Proteins", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995019/1JC1RdIfpG8", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2020/04/08944036", "title": "Computational Methods in Chemistry and Biochemistry Education: Visualization of Proteins", "doi": null, "abstractUrl": "/magazine/cs/2020/04/08944036/1g6v7aX7Uf6", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/04/09140348", "title": "<italic>AGTR2</italic>, One Possible Novel Key Gene for the Entry of SARS-CoV-2 Into Human Cells", "doi": null, "abstractUrl": "/journal/tb/2021/04/09140348/1lsnAOFl5rW", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313491", "title": "Protein Binding Pose Prediction via Conditional Variational Autoencoding for Plasmodium Falciparum", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313491/1qmgaXtwTxS", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08428603", "articleId": "13rRUwI5TPA", "__typename": "AdjacentArticleType" }, "next": { "fno": "08290943", "articleId": "13rRUB6SpYY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1u8lf7oucRa", "title": "May-June", "year": "2021", "issueNum": "03", "idPrefix": "tb", "pubType": "journal", "volume": "18", "label": "May-June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1iaepkjPq9i", "doi": "10.1109/TCBB.2020.2980260", "abstract": "Graph models often give us a deeper understanding of real-world networks. In the case of biological networks they help in predicting the evolution and history of biomolecule interactions, provided we map properly real networks into the corresponding graph models. In this paper, we show that for biological graph models many of the existing parameter estimation techniques overlook the critical property of graph symmetry (also known formally as graph automorphisms), thus the estimated parameters give statistically insignificant results concerning the observed network. To demonstrate it and to develop accurate estimation procedures, we focus on the biologically inspired duplication-divergence model, and the up-to-date data of protein-protein interactions of seven species including human and yeast. Using exact recurrence relations of some prominent graph statistics, we devise a parameter estimation technique that provides the right order of symmetries and uses phylogenetically old proteins as the choice of seed graph nodes. We also find that our results are consistent with the ones obtained from maximum likelihood estimation (MLE). However, the MLE approach is significantly slower than our methods in practice.", "abstracts": [ { "abstractType": "Regular", "content": "Graph models often give us a deeper understanding of real-world networks. In the case of biological networks they help in predicting the evolution and history of biomolecule interactions, provided we map properly real networks into the corresponding graph models. In this paper, we show that for biological graph models many of the existing parameter estimation techniques overlook the critical property of graph symmetry (also known formally as graph automorphisms), thus the estimated parameters give statistically insignificant results concerning the observed network. To demonstrate it and to develop accurate estimation procedures, we focus on the biologically inspired duplication-divergence model, and the up-to-date data of protein-protein interactions of seven species including human and yeast. Using exact recurrence relations of some prominent graph statistics, we devise a parameter estimation technique that provides the right order of symmetries and uses phylogenetically old proteins as the choice of seed graph nodes. We also find that our results are consistent with the ones obtained from maximum likelihood estimation (MLE). However, the MLE approach is significantly slower than our methods in practice.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph models often give us a deeper understanding of real-world networks. In the case of biological networks they help in predicting the evolution and history of biomolecule interactions, provided we map properly real networks into the corresponding graph models. In this paper, we show that for biological graph models many of the existing parameter estimation techniques overlook the critical property of graph symmetry (also known formally as graph automorphisms), thus the estimated parameters give statistically insignificant results concerning the observed network. To demonstrate it and to develop accurate estimation procedures, we focus on the biologically inspired duplication-divergence model, and the up-to-date data of protein-protein interactions of seven species including human and yeast. Using exact recurrence relations of some prominent graph statistics, we devise a parameter estimation technique that provides the right order of symmetries and uses phylogenetically old proteins as the choice of seed graph nodes. We also find that our results are consistent with the ones obtained from maximum likelihood estimation (MLE). However, the MLE approach is significantly slower than our methods in practice.", "title": "Revisiting Parameter Estimation in Biological Networks: Influence of Symmetries", "normalizedTitle": "Revisiting Parameter Estimation in Biological Networks: Influence of Symmetries", "fno": "09035452", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Biology Computing", "Evolution Biological", "Genetics", "Graph Theory", "Maximum Likelihood Estimation", "Molecular Biophysics", "Proteins", "Protein Protein Interactions", "Yeast", "Graph Statistics", "Seed Graph Nodes", "Maximum Likelihood Estimation", "Biological Networks", "Real World Networks", "Biomolecule Interactions", "Biological Graph Models", "Parameter Estimation", "Graph Symmetry", "Graph Automorphisms", "Biologically Inspired Duplication Divergence Model", "Exact Recurrence Relations", "Phylogenetically Old Proteins", "MLE", "Proteins", "Biological System Modeling", "Maximum Likelihood Estimation", "Parameter Estimation", "Evolution Biology", "Biological Networks", "Protein Protein Interaction", "Parameter Estimation", "Duplication Divergence", "Random Graphs" ], "authors": [ { "givenName": "Jithin K.", "surname": "Sreedharan", "fullName": "Jithin K. Sreedharan", "affiliation": "Department of Computer Science, NSF Center for Science and Information, Purdue University, West Lafayette, IN, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Krzysztof", "surname": "Turowski", "fullName": "Krzysztof Turowski", "affiliation": "Theoterical Computer Science Department, Jagiellonian University, Krakow, Poland", "__typename": "ArticleAuthorType" }, { "givenName": "Wojciech", "surname": "Szpankowski", "fullName": "Wojciech Szpankowski", "affiliation": "Department of Computer Science, NSF Center for Science and Information, Purdue University, West Lafayette, IN, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2021-05-01 00:00:00", "pubType": "trans", "pages": "836-849", "year": "2021", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/case/2006/0310/0/04120411", "title": "A Novel Algorithm for Node Localization and Motion Analysis in Wireless Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/case/2006/04120411/12OmNARiLZW", "parentPublication": { "id": "proceedings/case/2006/0310/0", "title": "2006 IEEE International Conference on Automation Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2013/5159/0/06726333", "title": "Feeling Sensors' Pulse: Accurate Noise Quantification in Participatory Sensing Network", "doi": null, "abstractUrl": "/proceedings-article/msn/2013/06726333/12OmNBOlloY", "parentPublication": { "id": "proceedings/msn/2013/5159/0", "title": "2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851e433", "title": "RAID-G: Robust Estimation of Approximate Infinite Dimensional Gaussian with Application to Material Recognition", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851e433/12OmNxw5B9B", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1990/2062/2/00119323", "title": "A new method for estimation of hidden Markov model parameters", "doi": null, "abstractUrl": "/proceedings-article/icpr/1990/00119323/12OmNyv7mjF", "parentPublication": { "id": "proceedings/icpr/1990/2062/2", "title": "Proceedings 10th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuma/1993/3850/0/00366737", "title": "A Bayesian analysis of entropy optimization for uncertainty modeling", "doi": null, "abstractUrl": "/proceedings-article/isuma/1993/00366737/12OmNzR8CzF", "parentPublication": { "id": "proceedings/isuma/1993/3850/0", "title": "1993 (2nd) International Symposium on Uncertainty Modeling and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706586", "title": "Structure identification and parameter estimation of biological s-systems", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706586/12OmNzl3WQG", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446424", "title": "An Exploration on the Integration of Vibrotactile and Force Cues for 3D Interactive Tasks", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446424/13bd1AITnaI", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2013/04/ttb2013040970", "title": "Characterizing the Topology of Probabilistic Biological Networks", "doi": null, "abstractUrl": "/journal/tb/2013/04/ttb2013040970/13rRUxBrGf9", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2018/7447/0/744701a322", "title": "Holonomic Approach for Item Response Theory Parameter Estimation", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2018/744701a322/19m3B8jSceI", "parentPublication": { "id": "proceedings/iiai-aai/2018/7447/0", "title": "2018 7th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300d220", "title": "Improving CNN Classifiers by Estimating Test-Time Priors", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300d220/1i5mpK7RW3m", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09034075", "articleId": "1i8zuCZ58Nq", "__typename": "AdjacentArticleType" }, "next": { "fno": "09446663", "articleId": "1u8lipNF3dC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nWK4ifrIac", "doi": "10.1109/TVCG.2020.3030415", "abstract": "We present a new technique for the rapid modeling and construction of scientifically accurate mesoscale biological models. The resulting 3D models are based on a few 2D microscopy scans and the latest knowledge available about the biological entity, represented as a set of geometric relationships. Our new visual-programming technique is based on statistical and rule-based modeling approaches that are rapid to author, fast to construct, and easy to revise. From a few 2D microscopy scans, we determine the statistical properties of various structural aspects, such as the outer membrane shape, the spatial properties, and the distribution characteristics of the macromolecular elements on the membrane. This information is utilized in the construction of the 3D model. Once all the imaging evidence is incorporated into the model, additional information can be incorporated by interactively defining the rules that spatially characterize the rest of the biological entity, such as mutual interactions among macromolecules, and their distances and orientations relative to other structures. These rules are defined through an intuitive 3D interactive visualization as a visual-programming feedback loop. We demonstrate the applicability of our approach on a use case of the modeling procedure of the SARS-CoV-2 virion ultrastructure. This atomistic model, which we present here, can steer biological research to new promising directions in our efforts to fight the spread of the virus.", "abstracts": [ { "abstractType": "Regular", "content": "We present a new technique for the rapid modeling and construction of scientifically accurate mesoscale biological models. The resulting 3D models are based on a few 2D microscopy scans and the latest knowledge available about the biological entity, represented as a set of geometric relationships. Our new visual-programming technique is based on statistical and rule-based modeling approaches that are rapid to author, fast to construct, and easy to revise. From a few 2D microscopy scans, we determine the statistical properties of various structural aspects, such as the outer membrane shape, the spatial properties, and the distribution characteristics of the macromolecular elements on the membrane. This information is utilized in the construction of the 3D model. Once all the imaging evidence is incorporated into the model, additional information can be incorporated by interactively defining the rules that spatially characterize the rest of the biological entity, such as mutual interactions among macromolecules, and their distances and orientations relative to other structures. These rules are defined through an intuitive 3D interactive visualization as a visual-programming feedback loop. We demonstrate the applicability of our approach on a use case of the modeling procedure of the SARS-CoV-2 virion ultrastructure. This atomistic model, which we present here, can steer biological research to new promising directions in our efforts to fight the spread of the virus.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a new technique for the rapid modeling and construction of scientifically accurate mesoscale biological models. The resulting 3D models are based on a few 2D microscopy scans and the latest knowledge available about the biological entity, represented as a set of geometric relationships. Our new visual-programming technique is based on statistical and rule-based modeling approaches that are rapid to author, fast to construct, and easy to revise. From a few 2D microscopy scans, we determine the statistical properties of various structural aspects, such as the outer membrane shape, the spatial properties, and the distribution characteristics of the macromolecular elements on the membrane. This information is utilized in the construction of the 3D model. Once all the imaging evidence is incorporated into the model, additional information can be incorporated by interactively defining the rules that spatially characterize the rest of the biological entity, such as mutual interactions among macromolecules, and their distances and orientations relative to other structures. These rules are defined through an intuitive 3D interactive visualization as a visual-programming feedback loop. We demonstrate the applicability of our approach on a use case of the modeling procedure of the SARS-CoV-2 virion ultrastructure. This atomistic model, which we present here, can steer biological research to new promising directions in our efforts to fight the spread of the virus.", "title": "<italic>Modeling in the Time of COVID-19:</italic> Statistical and Rule-based Mesoscale Models", "normalizedTitle": "Modeling in the Time of COVID-19: Statistical and Rule-based Mesoscale Models", "fno": "09224865", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Biology Computing", "Biomembranes", "Data Visualisation", "Interactive Systems", "Macromolecules", "Microorganisms", "Molecular Biophysics", "Solid Modelling", "Visual Programming", "Biological Entity", "Intuitive 3 D Interactive Visualization", "Visual Programming Feedback Loop", "SARS Co V 2 Virion Ultrastructure", "Atomistic Model", "Biological Research", "COVID 19", "Rapid Modeling", "Scientifically Accurate Mesoscale Biological Models", "2 D Microscopy Scans", "Visual Programming Technique", "Statistical Properties", "Outer Membrane Shape", "Spatial Properties", "Computational Modeling", "Three Dimensional Displays", "Biological System Modeling", "Solid Modeling", "Proteins", "Biomembranes", "Molecular Visualization", "Mesoscale Modeling" ], "authors": [ { "givenName": "Ngan", "surname": "Nguyen", "fullName": "Ngan Nguyen", "affiliation": "King Abdullah University of Science and Technology (KAUST), Saudi Arabia", "__typename": "ArticleAuthorType" }, { "givenName": "Ondřej", "surname": "Strnad", "fullName": "Ondřej Strnad", "affiliation": "King Abdullah University of Science and Technology (KAUST), Saudi Arabia", "__typename": "ArticleAuthorType" }, { "givenName": "Tobias", "surname": "Klein", "fullName": "Tobias Klein", "affiliation": "TU Wien and Nanographics GmbH", "__typename": "ArticleAuthorType" }, { "givenName": "Deng", "surname": "Luo", "fullName": "Deng Luo", "affiliation": "King Abdullah University of Science and Technology (KAUST), Saudi Arabia", "__typename": "ArticleAuthorType" }, { "givenName": "Ruwayda", "surname": "Alharbi", "fullName": "Ruwayda Alharbi", "affiliation": "King Abdullah University of Science and Technology (KAUST), Saudi Arabia", "__typename": "ArticleAuthorType" }, { "givenName": "Peter", "surname": "Wonka", "fullName": "Peter Wonka", "affiliation": "King Abdullah University of Science and Technology (KAUST), Saudi Arabia", "__typename": "ArticleAuthorType" }, { "givenName": "Martina", "surname": "Maritan", "fullName": "Martina Maritan", "affiliation": "Scripps Research Institute, US", "__typename": "ArticleAuthorType" }, { "givenName": "Peter", "surname": "Mindek", "fullName": "Peter Mindek", "affiliation": "TU Wien and Nanographics GmbH", "__typename": "ArticleAuthorType" }, { "givenName": "Ludovic", "surname": "Autin", "fullName": "Ludovic Autin", "affiliation": "Scripps Research Institute, US", "__typename": "ArticleAuthorType" }, { "givenName": "David S.", "surname": "Goodsell", "fullName": "David S. Goodsell", "affiliation": "Scripps Research Institute, US", "__typename": "ArticleAuthorType" }, { "givenName": "Ivan", "surname": "Viola", "fullName": "Ivan Viola", "affiliation": "King Abdullah University of Science and Technology (KAUST), Saudi Arabia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "722-732", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/wsc/2006/0500/0/04117797", "title": "Modeling and Analysis of Biological Processes by Mem(Brane) Calculi and Systems", "doi": null, "abstractUrl": "/proceedings-article/wsc/2006/04117797/12OmNB836Sl", "parentPublication": { "id": "proceedings/wsc/2006/0500/0", "title": "2006 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2015/0481/0/07394367", "title": "The mechanism of splitting mitochondria in terms of membrane automata", "doi": null, "abstractUrl": "/proceedings-article/isspit/2015/07394367/12OmNx2QUMz", "parentPublication": { "id": "proceedings/isspit/2015/0481/0", "title": "2015 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/02/07403958", "title": "Genome-Wide Semi-Automated Annotation of Transporter Systems", "doi": null, "abstractUrl": "/journal/tb/2017/02/07403958/13rRUwh80t9", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2006/01/n0017", "title": "Spatio-Temporal Analysis of Constitutive Exocytosis in Epithelial Cells", "doi": null, "abstractUrl": "/journal/tb/2006/01/n0017/13rRUxAStZo", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2016/04/07229308", "title": "Mem-mEN: Predicting Multi-Functional Types of Membrane Proteins by Interpretable Elastic Nets", "doi": null, "abstractUrl": "/journal/tb/2016/04/07229308/13rRUxC0SuG", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671290", "title": "A Constraint Propagation Approach for Identifying Biological Pathways in COVID-19 Knowledge Graphs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671290/1A8gp5yJ4re", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/02/09834316", "title": "Multi-View Kernel Sparse Representation for Identification of Membrane Protein Types", "doi": null, "abstractUrl": "/journal/tb/2023/02/09834316/1Fa9EejYsz6", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/02/09216491", "title": "<italic>Ab-Initio</italic> Membrane Protein Amphipathic Helix Structure Prediction Using Deep Neural Networks", "doi": null, "abstractUrl": "/journal/tb/2022/02/09216491/1nJspe5ZtUk", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/02/09233984", "title": "Immuno-Informatics Based Peptides: An Approach for Vaccine Development Against Outer Membrane Proteins of <italic>Pseudomonas</italic> Genus", "doi": null, "abstractUrl": "/journal/tb/2022/02/09233984/1o52bLy9UCQ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552241", "title": "<italic>COVID</italic>-view: Diagnosis of COVID-19 using Chest CT", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552241/1xic6RdmNC8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09286903", "articleId": "1por2UO3Q4M", "__typename": "AdjacentArticleType" }, "next": { "fno": "09241732", "articleId": "1oijQyHFwVa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qLdF2jcQN2", "name": "ttg202102-09224865s1-supp2-3030415.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09224865s1-supp2-3030415.pdf", "extension": "pdf", "size": "4.58 MB", "__typename": "WebExtraType" }, { "id": "1qLdGq9rHEI", "name": "ttg202102-09224865s1-supp1-3030415.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09224865s1-supp1-3030415.mp4", "extension": "mp4", "size": "294 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1sq7oiiwZUs", "title": "March-April", "year": "2021", "issueNum": "02", "idPrefix": "tb", "pubType": "journal", "volume": "18", "label": "March-April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1sq7os2QZPO", "doi": "10.1109/TCBB.2019.2918774", "abstract": "The regulatory process of Drosophila is thoroughly studied for understanding a great variety of biological principles. While pattern-forming gene networks are analyzed in the transcription step, post-transcriptional events (e.g., translation, protein processing) play an important role in establishing protein expression patterns and levels. Since the post-transcriptional regulation of Drosophila depends on spatiotemporal interactions between mRNAs and gap proteins, proper physically-inspired stochastic models are required to study the link between both quantities. Previous research attempts have shown that using Gaussian processes (GPs) and differential equations lead to promising predictions when analyzing regulatory networks. Here, we aim at further investigating two types of physically-inspired GP models based on a reaction-diffusion equation where the main difference lies in where the prior is placed. While one of them has been studied previously using protein data only, the other is novel and yields a simple approach requiring only the differentiation of kernel functions. In contrast to other stochastic frameworks, discretizing the spatial space is not required here. Both GP models are tested under different conditions depending on the availability of gap gene mRNA expression data. Finally, their performances are assessed on a high-resolution dataset describing the blastoderm stage of the early embryo of Drosophila melanogaster.", "abstracts": [ { "abstractType": "Regular", "content": "The regulatory process of Drosophila is thoroughly studied for understanding a great variety of biological principles. While pattern-forming gene networks are analyzed in the transcription step, post-transcriptional events (e.g., translation, protein processing) play an important role in establishing protein expression patterns and levels. Since the post-transcriptional regulation of Drosophila depends on spatiotemporal interactions between mRNAs and gap proteins, proper physically-inspired stochastic models are required to study the link between both quantities. Previous research attempts have shown that using Gaussian processes (GPs) and differential equations lead to promising predictions when analyzing regulatory networks. Here, we aim at further investigating two types of physically-inspired GP models based on a reaction-diffusion equation where the main difference lies in where the prior is placed. While one of them has been studied previously using protein data only, the other is novel and yields a simple approach requiring only the differentiation of kernel functions. In contrast to other stochastic frameworks, discretizing the spatial space is not required here. Both GP models are tested under different conditions depending on the availability of gap gene mRNA expression data. Finally, their performances are assessed on a high-resolution dataset describing the blastoderm stage of the early embryo of Drosophila melanogaster.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The regulatory process of Drosophila is thoroughly studied for understanding a great variety of biological principles. While pattern-forming gene networks are analyzed in the transcription step, post-transcriptional events (e.g., translation, protein processing) play an important role in establishing protein expression patterns and levels. Since the post-transcriptional regulation of Drosophila depends on spatiotemporal interactions between mRNAs and gap proteins, proper physically-inspired stochastic models are required to study the link between both quantities. Previous research attempts have shown that using Gaussian processes (GPs) and differential equations lead to promising predictions when analyzing regulatory networks. Here, we aim at further investigating two types of physically-inspired GP models based on a reaction-diffusion equation where the main difference lies in where the prior is placed. While one of them has been studied previously using protein data only, the other is novel and yields a simple approach requiring only the differentiation of kernel functions. In contrast to other stochastic frameworks, discretizing the spatial space is not required here. Both GP models are tested under different conditions depending on the availability of gap gene mRNA expression data. Finally, their performances are assessed on a high-resolution dataset describing the blastoderm stage of the early embryo of Drosophila melanogaster.", "title": "Physically-Inspired Gaussian Process Models for Post-Transcriptional Regulation in Drosophila", "normalizedTitle": "Physically-Inspired Gaussian Process Models for Post-Transcriptional Regulation in Drosophila", "fno": "08723187", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Bioinformatics", "Cellular Biophysics", "Differential Equations", "Gaussian Processes", "Genetics", "Genomics", "Molecular Biophysics", "Proteins", "RNA", "Stochastic Processes", "Kernel Functions", "Drosophila Regulatory Process", "Gaussian Processes", "Gap Proteins", "Protein Expression Patterns", "Protein Processing", "Pattern Forming Gene Networks", "Post Transcriptional Regulation", "Drosophila Melanogaster", "Gap Gene M RNA Expression Data", "Reaction Diffusion Equation", "Regulatory Networks", "Differential Equations", "Mathematical Model", "Proteins", "Biological System Modeling", "Data Models", "Differential Equations", "Embryo", "Kernel", "Biology And Genetics", "Diffusion Equation", "Regulatory Networks", "Stochastic Processes", "Gap Gene Expression Data" ], "authors": [ { "givenName": "Andrés F.", "surname": "López-Lopera", "fullName": "Andrés F. López-Lopera", "affiliation": "GMI Department, Mines Saint-Étienne, Univ Clermont Auvergne, CNRS, UMR 6158 LIMOS, Institut Henri Fayol, Saint-Étienne, France", "__typename": "ArticleAuthorType" }, { "givenName": "Nicolas", "surname": "Durrande", "fullName": "Nicolas Durrande", "affiliation": "GMI Department, Mines Saint-Étienne, Univ Clermont Auvergne, CNRS, UMR 6158 LIMOS, Institut Henri Fayol, Saint-Étienne, Cambridge, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Mauricio A.", "surname": "Álvarez", "fullName": "Mauricio A. Álvarez", "affiliation": "Department of Computer Science, University of Sheffield, Sheffield, United Kingdom", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-03-01 00:00:00", "pubType": "trans", "pages": "656-666", "year": "2021", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2010/4083/0/4083a112", "title": "Dynamic Complexity of the Temporal Transcriptional Regulation Program in Human Endotoxemia", "doi": null, "abstractUrl": "/proceedings-article/bibe/2010/4083a112/12OmNAYoKoj", "parentPublication": { "id": "proceedings/bibe/2010/4083/0", "title": "2010 IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2010/8303/0/05703937", "title": "Transcriptional regulation of drug target proteins from cancer related disease network", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703937/12OmNB1wkL1", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706587", "title": "An Iterated Conditional Modes solution for sparse Bayesian factor modeling of transcriptional regulatory networks", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706587/12OmNx76TNi", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ijcbs/2009/3739/0/3739a116", "title": "Layout and Post-Processing of Transcriptional Modules", "doi": null, "abstractUrl": "/proceedings-article/ijcbs/2009/3739a116/12OmNzahcd4", "parentPublication": { "id": "proceedings/ijcbs/2009/3739/0", "title": "2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icie/2010/4080/1/05571711", "title": "Regulatory Module Network of Basic/Helix-loop-helix Transcription Factors During Bovine Preimplantation Development in vivo", "doi": null, "abstractUrl": "/proceedings-article/icie/2010/05571711/13bd1eTtWYq", "parentPublication": { "id": "proceedings/icie/2010/4080/1", "title": "Information Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2009/03/mex2009030026", "title": "A Collaborative Multiagent System for Mining Transcriptional Regulatory Elements", "doi": null, "abstractUrl": "/magazine/ex/2009/03/mex2009030026/13rRUIIVlgB", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2016/03/07164314", "title": "A Modeling Framework for Generation of Positional and Temporal Simulations of Transcriptional Regulation", "doi": null, "abstractUrl": "/journal/tb/2016/03/07164314/13rRUxBa5m3", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2006/01/n0057", "title": "A Hidden Markov Model for Transcriptional Regulation in Single Cells", "doi": null, "abstractUrl": "/journal/tb/2006/01/n0057/13rRUy2YLWF", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2013/02/ttb2013020300", "title": "Computational Reconstruction of Transcriptional Relationships from ChIP-Chip Data", "doi": null, "abstractUrl": "/journal/tb/2013/02/ttb2013020300/13rRUyfKIG8", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/01/08288571", "title": "A Comparative Study of Network Motifs in the Integrated Transcriptional Regulation and Protein Interaction Networks of <italic>Shewanella</italic>", "doi": null, "abstractUrl": "/journal/tb/2019/01/08288571/17D45XvMcfb", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08731734", "articleId": "1aCbtbpGPDy", "__typename": "AdjacentArticleType" }, "next": { "fno": "08869783", "articleId": "1e9gXkqJ8L6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzC5T8C", "title": "April", "year": "2011", "issueNum": "04", "idPrefix": "tk", "pubType": "journal", "volume": "23", "label": "April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUILLkvM", "doi": "10.1109/TKDE.2010.150", "abstract": "Extracting biologically relevant information from DNA microarrays is a very important task for drug development and test, function annotation, and cancer diagnosis. Various clustering methods have been proposed for the analysis of gene expression data, but when analyzing the large and heterogeneous collections of gene expression data, conventional clustering algorithms often cannot produce a satisfactory solution. Biclustering algorithm has been presented as an alternative approach to standard clustering techniques to identify local structures from gene expression data set. These patterns may provide clues about the main biological processes associated with different physiological states. In this paper, different from existing bicluster patterns, we first introduce a more general pattern: correlated bicluster, which has intuitive biological interpretation. Then, we propose a novel transform technique based on singular value decomposition so that identifying correlated-bicluster problem from gene expression matrix is transformed into two global clustering problems. The Mixed-Clustering algorithm and the Lift algorithm are devised to efficiently produce \\delta-corBiclusters. The biclusters obtained using our method from gene expression data sets of multiple human organs and the yeast Saccharomyces cerevisiae demonstrate clear biological meanings.", "abstracts": [ { "abstractType": "Regular", "content": "Extracting biologically relevant information from DNA microarrays is a very important task for drug development and test, function annotation, and cancer diagnosis. Various clustering methods have been proposed for the analysis of gene expression data, but when analyzing the large and heterogeneous collections of gene expression data, conventional clustering algorithms often cannot produce a satisfactory solution. Biclustering algorithm has been presented as an alternative approach to standard clustering techniques to identify local structures from gene expression data set. These patterns may provide clues about the main biological processes associated with different physiological states. In this paper, different from existing bicluster patterns, we first introduce a more general pattern: correlated bicluster, which has intuitive biological interpretation. Then, we propose a novel transform technique based on singular value decomposition so that identifying correlated-bicluster problem from gene expression matrix is transformed into two global clustering problems. The Mixed-Clustering algorithm and the Lift algorithm are devised to efficiently produce \\delta-corBiclusters. The biclusters obtained using our method from gene expression data sets of multiple human organs and the yeast Saccharomyces cerevisiae demonstrate clear biological meanings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Extracting biologically relevant information from DNA microarrays is a very important task for drug development and test, function annotation, and cancer diagnosis. Various clustering methods have been proposed for the analysis of gene expression data, but when analyzing the large and heterogeneous collections of gene expression data, conventional clustering algorithms often cannot produce a satisfactory solution. Biclustering algorithm has been presented as an alternative approach to standard clustering techniques to identify local structures from gene expression data set. These patterns may provide clues about the main biological processes associated with different physiological states. In this paper, different from existing bicluster patterns, we first introduce a more general pattern: correlated bicluster, which has intuitive biological interpretation. Then, we propose a novel transform technique based on singular value decomposition so that identifying correlated-bicluster problem from gene expression matrix is transformed into two global clustering problems. The Mixed-Clustering algorithm and the Lift algorithm are devised to efficiently produce \\delta-corBiclusters. The biclusters obtained using our method from gene expression data sets of multiple human organs and the yeast Saccharomyces cerevisiae demonstrate clear biological meanings.", "title": "Finding Correlated Biclusters from Gene Expression Data", "normalizedTitle": "Finding Correlated Biclusters from Gene Expression Data", "fno": "ttk2011040568", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Biclustering", "Pattern Classification", "Gene Expression Data", "Singular Value Decomposition", "Data Mining", "Biology Computing" ], "authors": [ { "givenName": "Wen-Hui", "surname": "Yang", "fullName": "Wen-Hui Yang", "affiliation": "Sun Yat-Sen University, Guangzhou", "__typename": "ArticleAuthorType" }, { "givenName": "Dao-Qing", "surname": "Dai", "fullName": "Dao-Qing Dai", "affiliation": "Sun Yat-Sen University, Guangzhou", "__typename": "ArticleAuthorType" }, { "givenName": "Hong", "surname": "Yan", "fullName": "Hong Yan", "affiliation": "City University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2011-04-01 00:00:00", "pubType": "trans", "pages": "568-584", "year": "2011", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2013/5108/0/5108a747", "title": "Discovering Non-redundant Overlapping Biclusters on Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/icdm/2013/5108a747/12OmNB9t6mz", "parentPublication": { "id": "proceedings/icdm/2013/5108/0", "title": "2013 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csb/2004/2194/0/21940182", "title": "Biclustering in Gene Expression Data by Tendency", "doi": null, "abstractUrl": "/proceedings-article/csb/2004/21940182/12OmNCfAPGO", "parentPublication": { "id": "proceedings/csb/2004/2194/0", "title": "Proceedings. 2004 IEEE Computational Systems Bioinformatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csb/2004/2194/0/21940436", "title": "Gene Ontology Friendly Biclustering of Expression Profiles", "doi": null, "abstractUrl": "/proceedings-article/csb/2004/21940436/12OmNrJiCSA", "parentPublication": { "id": "proceedings/csb/2004/2194/0", "title": "Proceedings. 2004 IEEE Computational Systems Bioinformatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2012/4905/0/4905b056", "title": "Exclusive Row Biclustering for Gene Expression Using a Combinatorial Auction Approach", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905b056/12OmNx8fib4", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccicc/2016/3846/0/07862071", "title": "Ensemble cuckoo search biclustering of the gene expression data", "doi": null, "abstractUrl": "/proceedings-article/iccicc/2016/07862071/12OmNxWLTwv", "parentPublication": { "id": "proceedings/iccicc/2016/3846/0", "title": "2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icie/2009/3679/1/3679a099", "title": "Gene Expression Data Cluster Analysis", "doi": null, "abstractUrl": "/proceedings-article/icie/2009/3679a099/12OmNzxgHAm", "parentPublication": { "id": "proceedings/icie/2009/3679/1", "title": "2009 WASE International Conference on Information Engineering (ICIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/02/ttb2012020560", "title": "Parallelized Evolutionary Learning for Detection of Biclusters in Gene Expression Data", "doi": null, "abstractUrl": "/journal/tb/2012/02/ttb2012020560/13rRUx0xPtP", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2011/06/ttb2011061568", "title": "Integrated Analysis of Gene Expression and Copy Number Data on Gene Shaving Using Independent Component Analysis", "doi": null, "abstractUrl": "/journal/tb/2011/06/ttb2011061568/13rRUxASua3", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/03/06138849", "title": "Empirical Evidence of the Applicability of Functional Clustering through Gene Expression Classification", "doi": null, "abstractUrl": "/journal/tb/2012/03/06138849/13rRUyXKxSY", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2018/8023/0/802300a546", "title": "A Study of Biclustering Coherence Measures for Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/bracis/2018/802300a546/17D45XeKgpT", "parentPublication": { "id": "proceedings/bracis/2018/8023/0", "title": "2018 7th Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttk2011040554", "articleId": "13rRUwwJWG3", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttk2011040585", "articleId": "13rRUwInv4R", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwswg8p", "title": "March/April", "year": "2012", "issueNum": "02", "idPrefix": "tb", "pubType": "journal", "volume": "9", "label": "March/April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUx0xPtP", "doi": "10.1109/TCBB.2011.53", "abstract": "The analysis of gene expression data obtained from microarray experiments is important for discovering the biological process of genes. Biclustering algorithms have been proven to be able to group the genes with similar expression patterns under a number of experimental conditions. In this paper, we propose a new biclustering algorithm based on evolutionary learning. By converting the biclustering problem into a common clustering problem, the algorithm can be applied in a search space constructed by the conditions. To further reduce the size of the search space, we randomly separate the full conditions into a number of condition subsets (subspaces), each of which has a smaller number of conditions. The algorithm is applied to each subspace and is able to discover bicluster seeds within a limited computing time. Finally, an expanding and merging procedure is employed to combine the bicluster seeds into larger biclusters according to a homogeneity criterion. We test the performance of the proposed algorithm using synthetic and real microarray data sets. Compared with several previously developed biclustering algorithms, our algorithm demonstrates a significant improvement in discovering additive biclusters.", "abstracts": [ { "abstractType": "Regular", "content": "The analysis of gene expression data obtained from microarray experiments is important for discovering the biological process of genes. Biclustering algorithms have been proven to be able to group the genes with similar expression patterns under a number of experimental conditions. In this paper, we propose a new biclustering algorithm based on evolutionary learning. By converting the biclustering problem into a common clustering problem, the algorithm can be applied in a search space constructed by the conditions. To further reduce the size of the search space, we randomly separate the full conditions into a number of condition subsets (subspaces), each of which has a smaller number of conditions. The algorithm is applied to each subspace and is able to discover bicluster seeds within a limited computing time. Finally, an expanding and merging procedure is employed to combine the bicluster seeds into larger biclusters according to a homogeneity criterion. We test the performance of the proposed algorithm using synthetic and real microarray data sets. Compared with several previously developed biclustering algorithms, our algorithm demonstrates a significant improvement in discovering additive biclusters.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The analysis of gene expression data obtained from microarray experiments is important for discovering the biological process of genes. Biclustering algorithms have been proven to be able to group the genes with similar expression patterns under a number of experimental conditions. In this paper, we propose a new biclustering algorithm based on evolutionary learning. By converting the biclustering problem into a common clustering problem, the algorithm can be applied in a search space constructed by the conditions. To further reduce the size of the search space, we randomly separate the full conditions into a number of condition subsets (subspaces), each of which has a smaller number of conditions. The algorithm is applied to each subspace and is able to discover bicluster seeds within a limited computing time. Finally, an expanding and merging procedure is employed to combine the bicluster seeds into larger biclusters according to a homogeneity criterion. We test the performance of the proposed algorithm using synthetic and real microarray data sets. Compared with several previously developed biclustering algorithms, our algorithm demonstrates a significant improvement in discovering additive biclusters.", "title": "Parallelized Evolutionary Learning for Detection of Biclusters in Gene Expression Data", "normalizedTitle": "Parallelized Evolutionary Learning for Detection of Biclusters in Gene Expression Data", "fno": "ttb2012020560", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Gene Expression", "Clustering Algorithms", "Bioinformatics", "Search Problems", "Computational Biology", "Algorithm Design And Analysis", "Optics", "Gene Expression Data Analysis", "Biclustering", "Genetic Learning", "Subdimensional Search Strategy" ], "authors": [ { "givenName": null, "surname": "Qinghua Huang", "fullName": "Qinghua Huang", "affiliation": "Sch. of Electron. & Inf. Eng., South China Univ. of Technol., Guangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": null, "surname": "Dacheng Tao", "fullName": "Dacheng Tao", "affiliation": "Centre for Quantum Comput. & Intell. Syst., Univ. of Technol., Sydney, NSW, Australia", "__typename": "ArticleAuthorType" }, { "givenName": null, "surname": "Xuelong Li", "fullName": "Xuelong Li", "affiliation": "State Key Lab. of Transient Opt. & Photonics, Xi'an Inst. of Opt. & Precision Mech., Xi'an, China", "__typename": "ArticleAuthorType" }, { "givenName": "A.", "surname": "Liew", "fullName": "A. Liew", "affiliation": "Sch. of Inf. & Commun. Technol., Griffith Univ., Griffith, QLD, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2012-03-01 00:00:00", "pubType": "trans", "pages": "560-570", "year": "2012", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2013/5108/0/5108a747", "title": "Discovering Non-redundant Overlapping Biclusters on Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/icdm/2013/5108a747/12OmNB9t6mz", "parentPublication": { "id": "proceedings/icdm/2013/5108/0", "title": "2013 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2009/3545/0/3545b219", "title": "Exploiting Domain Knowledge to Improve Biological Significance of Biclusters with Key Missing Genes", "doi": null, "abstractUrl": "/proceedings-article/icde/2009/3545b219/12OmNBhZ4r9", "parentPublication": { "id": "proceedings/icde/2009/3545/0", "title": "2009 IEEE 25th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375656", "title": "Rough Overlapping Biclustering of Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375656/12OmNC943E9", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2004/2173/0/21730283", "title": "Mining Deterministic Biclusters in Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/bibe/2004/21730283/12OmNvD8Rta", "parentPublication": { "id": "proceedings/bibe/2004/2173/0", "title": "Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'04)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2012/2621/0/06327427", "title": "Evolutionary Biclustering Algorithm of Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/dexa/2012/06327427/12OmNvjgWY0", "parentPublication": { "id": "proceedings/dexa/2012/2621/0", "title": "2012 23rd International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccicc/2016/3846/0/07862071", "title": "Ensemble cuckoo search biclustering of the gene expression data", "doi": null, "abstractUrl": "/proceedings-article/iccicc/2016/07862071/12OmNxWLTwv", "parentPublication": { "id": "proceedings/iccicc/2016/3846/0", "title": "2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcasia/2005/2486/0/24860627", "title": "Biclustering of Gene Expression Data by Simulated Annealing", "doi": null, "abstractUrl": "/proceedings-article/hpcasia/2005/24860627/12OmNxecRUi", "parentPublication": { "id": "proceedings/hpcasia/2005/2486/0", "title": "Proceedings. Eighth International Conference on High-Performance Computing in Asia-Pacific Region", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2011/04/ttk2011040568", "title": "Finding Correlated Biclusters from Gene Expression Data", "doi": null, "abstractUrl": "/journal/tk/2011/04/ttk2011040568/13rRUILLkvM", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2018/8023/0/802300a546", "title": "A Study of Biclustering Coherence Measures for Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/bracis/2018/802300a546/17D45XeKgpT", "parentPublication": { "id": "proceedings/bracis/2018/8023/0", "title": "2018 7th Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/02/09187559", "title": "Row and Column Structure-Based Biclustering for Gene Expression Data", "doi": null, "abstractUrl": "/journal/tb/2022/02/09187559/1mVFjzRRRaU", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttb2012020548", "articleId": "13rRUxBJhtD", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttb2012020571", "articleId": "13rRUNvgz8i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgGv", "name": "ttb2012020560s2.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttb2012020560s2.pdf", "extension": "pdf", "size": "300 kB", "__typename": "WebExtraType" }, { "id": "17ShDTXFgGu", "name": "ttb2012020560s1.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttb2012020560s1.pdf", "extension": "pdf", "size": "33.8 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNAXPyfv", "title": "Nov.-Dec.", "year": "2015", "issueNum": "06", "idPrefix": "tb", "pubType": "journal", "volume": "12", "label": "Nov.-Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUy0HYPK", "doi": "10.1109/TCBB.2015.2430860", "abstract": "Recent advances of technology have made it easy to obtain and compare whole genomes. Rearrangements of genomes through operations such as reversals and transpositions are rare events that enable researchers to reconstruct deep evolutionary history among species. Some of the popular methods need to search a large tree space for the best scored tree, thus it is desirable to have a fast and accurate method that can score a given tree efficiently. During the tree scoring procedure, the genomic structures of internal tree nodes are also provided, which provide important information for inferring ancestral genomes and for modeling the evolutionary processes. However, computing tree scores and ancestral genomes are very difficult and a lot of researchers have to rely on heuristic methods which have various disadvantages. In this paper, we describe the first genetic algorithm for tree scoring and ancestor inference, which uses a fitness function considering co-evolution, adopts different initial seeding methods to initialize the first population pool, and utilizes a sorting-based approach to realize evolution. Our extensive experiments show that compared with other existing algorithms, this new method is more accurate and can infer ancestral genomes that are much closer to the true ancestors.", "abstracts": [ { "abstractType": "Regular", "content": "Recent advances of technology have made it easy to obtain and compare whole genomes. Rearrangements of genomes through operations such as reversals and transpositions are rare events that enable researchers to reconstruct deep evolutionary history among species. Some of the popular methods need to search a large tree space for the best scored tree, thus it is desirable to have a fast and accurate method that can score a given tree efficiently. During the tree scoring procedure, the genomic structures of internal tree nodes are also provided, which provide important information for inferring ancestral genomes and for modeling the evolutionary processes. However, computing tree scores and ancestral genomes are very difficult and a lot of researchers have to rely on heuristic methods which have various disadvantages. In this paper, we describe the first genetic algorithm for tree scoring and ancestor inference, which uses a fitness function considering co-evolution, adopts different initial seeding methods to initialize the first population pool, and utilizes a sorting-based approach to realize evolution. Our extensive experiments show that compared with other existing algorithms, this new method is more accurate and can infer ancestral genomes that are much closer to the true ancestors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recent advances of technology have made it easy to obtain and compare whole genomes. Rearrangements of genomes through operations such as reversals and transpositions are rare events that enable researchers to reconstruct deep evolutionary history among species. Some of the popular methods need to search a large tree space for the best scored tree, thus it is desirable to have a fast and accurate method that can score a given tree efficiently. During the tree scoring procedure, the genomic structures of internal tree nodes are also provided, which provide important information for inferring ancestral genomes and for modeling the evolutionary processes. However, computing tree scores and ancestral genomes are very difficult and a lot of researchers have to rely on heuristic methods which have various disadvantages. In this paper, we describe the first genetic algorithm for tree scoring and ancestor inference, which uses a fitness function considering co-evolution, adopts different initial seeding methods to initialize the first population pool, and utilizes a sorting-based approach to realize evolution. Our extensive experiments show that compared with other existing algorithms, this new method is more accurate and can infer ancestral genomes that are much closer to the true ancestors.", "title": "A Cooperative Co-Evolutionary Genetic Algorithm for Tree Scoring and Ancestral Genome Inference", "normalizedTitle": "A Cooperative Co-Evolutionary Genetic Algorithm for Tree Scoring and Ancestral Genome Inference", "fno": "07103335", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Bioinformatics", "Genomics", "Vegetation", "Sociology", "Statistics", "Genetic Algorithms", "Sorting", "Ancestor Inference", "Genome Rearrangement", "Phylogenetic Reconstruction", "Genetic Algorithm", "Ancestor Inference", "Genome Rearrangement", "Phylogenetic Reconstruction", "Genetic Algorithm" ], "authors": [ { "givenName": "Nan", "surname": "Gao", "fullName": "Nan Gao", "affiliation": ", Zhejiang University of Technology, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yan", "surname": "Zhang", "fullName": "Yan Zhang", "affiliation": ", University of South Carolina, Columbia, SC 29208", "__typename": "ArticleAuthorType" }, { "givenName": "Bing", "surname": "Feng", "fullName": "Bing Feng", "affiliation": ", University of South Carolina, Columbia, SC 29208", "__typename": "ArticleAuthorType" }, { "givenName": "Jijun", "surname": "Tang", "fullName": "Jijun Tang", "affiliation": ", Tianjin University of China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2015-11-01 00:00:00", "pubType": "trans", "pages": "1248-1254", "year": "2015", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2017/1324/0/132401a249", "title": "Exploration of Natural Alignment Scoring Rules and Clustering Thresholds for Bacterial Core/Pan Genome Analysis", "doi": null, "abstractUrl": "/proceedings-article/bibe/2017/132401a249/12OmNwIpNo2", "parentPublication": { "id": "proceedings/bibe/2017/1324/0", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999377", "title": "Assessing ancestral genome reconstruction methods by resampling", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999377/12OmNxu6paK", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/03/06702461", "title": "Effect of Incomplete Lineage Sorting On Tree-Reconciliation-Based Inference of Gene Duplication", "doi": null, "abstractUrl": "/journal/tb/2014/03/06702461/13rRUEgs2Ah", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2013/01/ttb2013010122", "title": "Rearrangement-Based Phylogeny Using the Single-Cut-or-Join Operation", "doi": null, "abstractUrl": "/journal/tb/2013/01/ttb2013010122/13rRUEgs2rY", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/04/06755513", "title": "Probabilistic Reconstruction of Ancestral Gene Orders with Insertions and Deletions", "doi": null, "abstractUrl": "/journal/tb/2014/04/06755513/13rRUNvgz8k", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/04/07837680", "title": "The SCJ Small Parsimony Problem for Weighted Gene Adjacencies", "doi": null, "abstractUrl": "/journal/tb/2019/04/07837680/13rRUwvT9fc", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/02/07434624", "title": "Building Ancestral Recombination Graphs for Whole Genomes", "doi": null, "abstractUrl": "/journal/tb/2017/02/07434624/13rRUyoPSVC", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/03/08515078", "title": "CURatio: Genome-Wide Phylogenomic Analysis Method Using Ratios of Total Branch Lengths", "doi": null, "abstractUrl": "/journal/tb/2020/03/08515078/14NIz5UvMQ0", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/06/08316878", "title": "Scaffolding of Ancient Contigs and Ancestral Reconstruction in a Phylogenetic Framework", "doi": null, "abstractUrl": "/journal/tb/2018/06/08316878/17D45W9KVFt", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/06/09477014", "title": "Heuristics for Genome Rearrangement Distance With Replicated Genes", "doi": null, "abstractUrl": "/journal/tb/2021/06/09477014/1v2LYKjTPgs", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07112520", "articleId": "13rRUxASuz7", "__typename": "AdjacentArticleType" }, "next": { "fno": "07102705", "articleId": "13rRUILLkCm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzd7bIV", "title": "March-April", "year": "2017", "issueNum": "02", "idPrefix": "tb", "pubType": "journal", "volume": "14", "label": "March-April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyoPSVC", "doi": "10.1109/TCBB.2016.2542801", "abstract": "We propose a heuristic algorithm, called ARG4WG, to build plausible ancestral recombination graphs (ARGs) from thousands of whole genome samples. By using the longest shared end for recombination inference, ARG4WG constructs ARGs with small numbers of recombination events that perform well in association mapping on genome-wide association studies.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a heuristic algorithm, called ARG4WG, to build plausible ancestral recombination graphs (ARGs) from thousands of whole genome samples. By using the longest shared end for recombination inference, ARG4WG constructs ARGs with small numbers of recombination events that perform well in association mapping on genome-wide association studies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a heuristic algorithm, called ARG4WG, to build plausible ancestral recombination graphs (ARGs) from thousands of whole genome samples. By using the longest shared end for recombination inference, ARG4WG constructs ARGs with small numbers of recombination events that perform well in association mapping on genome-wide association studies.", "title": "Building Ancestral Recombination Graphs for Whole Genomes", "normalizedTitle": "Building Ancestral Recombination Graphs for Whole Genomes", "fno": "07434624", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Genomics", "Heuristic Programming", "Ancestral Recombination Graphs", "Whole Genomes", "Heuristic Algorithm", "ARG 4 WG", "Longest Shared End", "Recombination Inference", "Recombination Events", "Association Mapping", "Genome Wide Association Studies", "Genomics", "Buildings", "Bioinformatics", "Sociology", "Statistics", "Computational Efficiency", "Hidden Markov Models", "Ancestral Recombination Graphs", "Association Mapping" ], "authors": [ { "givenName": "Thao Thi Phuong", "surname": "Nguyen", "fullName": "Thao Thi Phuong Nguyen", "affiliation": "Institute of Information Technology, Vietnam Academy of Science and Technology, 18 Hoang Quoc Viet, Cau Giay, Hanoi, Vietnam", "__typename": "ArticleAuthorType" }, { "givenName": "Vinh Sy", "surname": "Le", "fullName": "Vinh Sy Le", "affiliation": "VNU University of Technology and Engineering, 144 Xuan Thuy, Cau Giay, Hanoi, Vietnam", "__typename": "ArticleAuthorType" }, { "givenName": "Hai Bich", "surname": "Ho", "fullName": "Hai Bich Ho", "affiliation": "Institute of Information Technology, Vietnam Academy of Science and Technology, 18 Hoang Quoc Viet, Cau Giay, Hanoi, Vietnam", "__typename": "ArticleAuthorType" }, { "givenName": "Quang", "surname": "Si Le", "fullName": "Quang Si Le", "affiliation": "School of Pharmacy and Biomedical Sciences, University of Portsmouth, Winston Churchill Avenue Portsmouth, United Kingdom", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2017-03-01 00:00:00", "pubType": "trans", "pages": "478-483", "year": "2017", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2007/1509/0/04375638", "title": "Hot and Cold: Spatial Fluctuation in HIV-1 Recombination Rates", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375638/12OmNAkWvqR", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217649", "title": "Multiplex confounding factor correction for genomic association mapping with squared sparse linear mixed model", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217649/12OmNBsue2M", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2015/7143/0/7143a137", "title": "Analysis of a Haplotype Structure in a Non-coding Region of Human Chromosome 22", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2015/7143a137/12OmNC0guA7", "parentPublication": { "id": "proceedings/icmtma/2015/7143/0", "title": "2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smrlo/2016/9941/0/9941a414", "title": "Organizational Heterogeneity of the Human Genome: Significant Variation of Recombination Rate of 100 kbp Sequences within GC Ranges", "doi": null, "abstractUrl": "/proceedings-article/smrlo/2016/9941a414/12OmNx3HI5T", "parentPublication": { "id": "proceedings/smrlo/2016/9941/0", "title": "2016 Second International Symposium on Stochastic Models in Reliability Engineering, Life Science and Operations Management (SMRLO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2011/1799/0/06120408", "title": "Prediction of Trans-regulators of Recombination Hotspots in Mouse Genome", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120408/12OmNxQOjxz", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999377", "title": "Assessing ancestral genome reconstruction methods by resampling", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999377/12OmNxu6paK", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2013/05/ttb2013051263", "title": "Computing the Joint Distribution of Tree Shape and Tree Distance for Gene Tree Inference and Recombination Detection", "doi": null, "abstractUrl": "/journal/tb/2013/05/ttb2013051263/13rRUxNEqUf", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2010/04/ttb2010040579", "title": "Rearrangement Phylogeny of Genomes in Contig Form", "doi": null, "abstractUrl": "/journal/tb/2010/04/ttb2010040579/13rRUxZ0nZS", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2015/06/07103335", "title": "A Cooperative Co-Evolutionary Genetic Algorithm for Tree Scoring and Ancestral Genome Inference", "doi": null, "abstractUrl": "/journal/tb/2015/06/07103335/13rRUy0HYPK", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/06/08316878", "title": "Scaffolding of Ancient Contigs and Ancestral Reconstruction in a Phylogenetic Framework", "doi": null, "abstractUrl": "/journal/tb/2018/06/08316878/17D45W9KVFt", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07435288", "articleId": "13rRUyuNsE9", "__typename": "AdjacentArticleType" }, "next": { "fno": "07420678", "articleId": "13rRUy0qnEL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1por2UO3Q4M", "doi": "10.1109/TVCG.2020.3030437", "abstract": "Pathogen outbreaks (i.e., outbreaks of bacteria and viruses) in hospitals can cause high mortality rates and increase costs for hospitals significantly. An outbreak is generally noticed when the number of infected patients rises above an endemic level or the usual prevalence of a pathogen in a defined population. Reconstructing transmission pathways back to the source of an outbreak - the patient zero or index patient - requires the analysis of microbiological data and patient contacts. This is often manually completed by infection control experts. We present a novel visual analytics approach to support the analysis of transmission pathways, patient contacts, the progression of the outbreak, and patient timelines during hospitalization. Infection control experts applied our solution to a real outbreak of Klebsiella pneumoniae in a large German hospital. Using our system, our experts were able to scale the analysis of transmission pathways to longer time intervals (i.e., several years of data instead of days) and across a larger number of wards. Also, the system is able to reduce the analysis time from days to hours. In our final study, feedback from twenty-five experts from seven German hospitals provides evidence that our solution brings significant benefits for analyzing outbreaks.", "abstracts": [ { "abstractType": "Regular", "content": "Pathogen outbreaks (i.e., outbreaks of bacteria and viruses) in hospitals can cause high mortality rates and increase costs for hospitals significantly. An outbreak is generally noticed when the number of infected patients rises above an endemic level or the usual prevalence of a pathogen in a defined population. Reconstructing transmission pathways back to the source of an outbreak - the patient zero or index patient - requires the analysis of microbiological data and patient contacts. This is often manually completed by infection control experts. We present a novel visual analytics approach to support the analysis of transmission pathways, patient contacts, the progression of the outbreak, and patient timelines during hospitalization. Infection control experts applied our solution to a real outbreak of Klebsiella pneumoniae in a large German hospital. Using our system, our experts were able to scale the analysis of transmission pathways to longer time intervals (i.e., several years of data instead of days) and across a larger number of wards. Also, the system is able to reduce the analysis time from days to hours. In our final study, feedback from twenty-five experts from seven German hospitals provides evidence that our solution brings significant benefits for analyzing outbreaks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Pathogen outbreaks (i.e., outbreaks of bacteria and viruses) in hospitals can cause high mortality rates and increase costs for hospitals significantly. An outbreak is generally noticed when the number of infected patients rises above an endemic level or the usual prevalence of a pathogen in a defined population. Reconstructing transmission pathways back to the source of an outbreak - the patient zero or index patient - requires the analysis of microbiological data and patient contacts. This is often manually completed by infection control experts. We present a novel visual analytics approach to support the analysis of transmission pathways, patient contacts, the progression of the outbreak, and patient timelines during hospitalization. Infection control experts applied our solution to a real outbreak of Klebsiella pneumoniae in a large German hospital. Using our system, our experts were able to scale the analysis of transmission pathways to longer time intervals (i.e., several years of data instead of days) and across a larger number of wards. Also, the system is able to reduce the analysis time from days to hours. In our final study, feedback from twenty-five experts from seven German hospitals provides evidence that our solution brings significant benefits for analyzing outbreaks.", "title": "In Search of Patient Zero: Visual Analytics of Pathogen Transmission Pathways in Hospitals", "normalizedTitle": "In Search of Patient Zero: Visual Analytics of Pathogen Transmission Pathways in Hospitals", "fno": "09286903", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Visualisation", "Diseases", "Health Care", "Hospitals", "Medical Information Systems", "Microorganisms", "Index Patient", "Patient Contacts", "Infection Control Experts", "Visual Analytics Approach", "Patient Timelines", "Hospitalization", "German Hospital", "Patient Zero", "Pathogen Transmission Pathways", "Pathogen Outbreaks", "Mortality Rates", "Infected Patients", "Microbiological Data Analysis", "Klebsiella Pneumoniae", "Hospitals", "Pathogens", "Data Visualization", "Task Analysis", "Visual Analytics", "Statistics", "Sociology", "Dynamic Networks", "Visualization Applications", "Health", "Medicine", "Outbreak", "Klebsiella", "Infection Control" ], "authors": [ { "givenName": "T.", "surname": "Baumgartl", "fullName": "T. Baumgartl", "affiliation": "TU Darmstadt, Darmstadt, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "M.", "surname": "Petzold", "fullName": "M. Petzold", "affiliation": "University Hospital Heidelberg, Heidelberg, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "M.", "surname": "Wunderlich", "fullName": "M. Wunderlich", "affiliation": "TU Darmstadt, Darmstadt, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "M.", "surname": "Hohn", "fullName": "M. Hohn", "affiliation": "TU Darmstadt, Darmstadt, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "D.", "surname": "Archambault", "fullName": "D. Archambault", "affiliation": "Swansea University, Swansea, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "M.", "surname": "Lieser", "fullName": "M. Lieser", "affiliation": "University Hospital Heidelberg, Heidelberg, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "A.", "surname": "Dalpke", "fullName": "A. Dalpke", "affiliation": "TU Dresden, Dresden, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "S.", "surname": "Scheithauer", "fullName": "S. Scheithauer", "affiliation": "University Medicine Gottingen, Universitat Gottingen, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "M.", "surname": "Marschollek", "fullName": "M. Marschollek", "affiliation": "L. Reichertz Institute for Medical Informatics, Hannover, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "V. M.", "surname": "Eichel", "fullName": "V. M. Eichel", "affiliation": "University Hospital Heidelberg, Heidelberg, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "N. T.", "surname": "Mutters", "fullName": "N. T. Mutters", "affiliation": "University Hospital Heidelberg, Heidelberg, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Highmed", "surname": "Consortium", "fullName": "Highmed Consortium", "affiliation": "L. Reichertz Institute for Medical Informatics, Hannover, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "T. Von", "surname": "Landesberger", "fullName": "T. Von Landesberger", "affiliation": "TU Darmstadt, Darmstadt, Germany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "711-721", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2012/4925/0/4925a057", "title": "Adapting Surgical Models to Individual Hospitals Using Transfer Learning", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2012/4925a057/12OmNAR1aSl", "parentPublication": { "id": "proceedings/icdmw/2012/4925/0", "title": "2012 IEEE 12th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2017/3187/0/08387499", "title": "Visual analytics for evaluating clinical pathways", "doi": null, "abstractUrl": "/proceedings-article/vahc/2017/08387499/12OmNAle6wG", "parentPublication": { "id": "proceedings/vahc/2017/3187/0", "title": "2017 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/enic/2015/7592/0/7592a150", "title": "Contact Networks and the Spread of MRSA in Stockholm Hospitals", "doi": null, "abstractUrl": "/proceedings-article/enic/2015/7592a150/12OmNAsk4AA", "parentPublication": { "id": "proceedings/enic/2015/7592/0", "title": "2015 Second European Network Intelligence Conference (ENIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scamc/1983/0503/0/00764716", "title": "Using drgs to conduct utilization review in naval hospitals", "doi": null, "abstractUrl": "/proceedings-article/scamc/1983/00764716/12OmNB8TU4Y", "parentPublication": { "id": "proceedings/scamc/1983/0503/0", "title": "1983 The Seventh Annual Symposium on Computer Applications in Medical Care", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2008/3165/0/3165a536", "title": "A Random Effects Sensitivity Analysis for Patient Pathways Model", "doi": null, "abstractUrl": "/proceedings-article/cbms/2008/3165a536/12OmNxI0KyC", "parentPublication": { "id": "proceedings/cbms/2008/3165/0", "title": "2008 21st IEEE International Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2010/4257/0/4257a442", "title": "BODY -- Buckets of Disease Symptoms for Disease Outbreak Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a442/12OmNyvGymA", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2017/3187/0/08387494", "title": "Patient-provider geographic map: An interactive visualization tool of patients' selection of health care providers", "doi": null, "abstractUrl": "/proceedings-article/vahc/2017/08387494/12OmNzcPAKL", "parentPublication": { "id": "proceedings/vahc/2017/3187/0", "title": "2017 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2009/03/mcg2009030018", "title": "Generating Synthetic Syndromic-Surveillance Data for Evaluating Visual-Analytics Techniques", "doi": null, "abstractUrl": "/magazine/cg/2009/03/mcg2009030018/13rRUxBrGjm", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378117", "title": "Predicting Clinical Deterioration in Hospitals", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378117/1s64YzCb6OA", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a151", "title": "ConVIScope: Visual Analytics for Exploring Patient Conversations", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a151/1yXul7EUtuE", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09222085", "articleId": "1nTqvP5vNXW", "__typename": "AdjacentArticleType" }, "next": { "fno": "09224865", "articleId": "1nWK4ifrIac", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qLdSfvPQ76", "name": "ttg202102-09286903s1-tvcg-3030437-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09286903s1-tvcg-3030437-mm.zip", "extension": "zip", "size": "55.5 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1JP1e1gAvYY", "title": "Feb.", "year": "2023", "issueNum": "02", "idPrefix": "tk", "pubType": "journal", "volume": "35", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1vyjfHj30kM", "doi": "10.1109/TKDE.2021.3096670", "abstract": "Searching for a person&#x2019;s name is a common online activity. However, Web search engines provide few accurate results to queries containing names. In contrast to a general word that has only one correct spelling, there are several possible legitimate spellings when a name provided as a query. Today, most techniques used to suggest diminutives and alternative spellings in online search are based on pattern matching and phonetic encoding; however, they often perform poorly. As a result, there is a need for an effective tool for improved alternative name suggestion for a name provided as a query. In this paper, we propose a revolutionary approach for tackling the problem of alternative name suggestion. Our novel algorithm, <italic>GRAFT</italic>, utilizes historical data collected from genealogy websites, along with network algorithms. <italic>GRAFT</italic> is a general algorithm that suggests alternatives for input names using a graph based on names derived from digitized ancestral family trees. Alternative names are extracted from this graph, which is constructed using generic ordering functions that outperform other algorithms that suggest diminutives and alternative spellings based on a single dimension, a factor that limits their performance. We evaluated <italic>GRAFT</italic>&#x2019;s performance on three ground truth datasets of forenames and surnames, including a large-scale online genealogy dataset with over 16 million profiles and more than 700,000 unique forenames and 500,000 surnames. We compared <italic>GRAFT</italic>&#x2019;s performance at suggesting alternative names to the performance of 10 other algorithms, including phonetic encoding, string similarity, machine learning, and deep learning algorithms. The results show <italic>GRAFT</italic>&#x2019;s superiority with regard to both forenames and surnames and demonstrate its use as a tool to improve alternative name suggestion.", "abstracts": [ { "abstractType": "Regular", "content": "Searching for a person&#x2019;s name is a common online activity. However, Web search engines provide few accurate results to queries containing names. In contrast to a general word that has only one correct spelling, there are several possible legitimate spellings when a name provided as a query. Today, most techniques used to suggest diminutives and alternative spellings in online search are based on pattern matching and phonetic encoding; however, they often perform poorly. As a result, there is a need for an effective tool for improved alternative name suggestion for a name provided as a query. In this paper, we propose a revolutionary approach for tackling the problem of alternative name suggestion. Our novel algorithm, <italic>GRAFT</italic>, utilizes historical data collected from genealogy websites, along with network algorithms. <italic>GRAFT</italic> is a general algorithm that suggests alternatives for input names using a graph based on names derived from digitized ancestral family trees. Alternative names are extracted from this graph, which is constructed using generic ordering functions that outperform other algorithms that suggest diminutives and alternative spellings based on a single dimension, a factor that limits their performance. We evaluated <italic>GRAFT</italic>&#x2019;s performance on three ground truth datasets of forenames and surnames, including a large-scale online genealogy dataset with over 16 million profiles and more than 700,000 unique forenames and 500,000 surnames. We compared <italic>GRAFT</italic>&#x2019;s performance at suggesting alternative names to the performance of 10 other algorithms, including phonetic encoding, string similarity, machine learning, and deep learning algorithms. The results show <italic>GRAFT</italic>&#x2019;s superiority with regard to both forenames and surnames and demonstrate its use as a tool to improve alternative name suggestion.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Searching for a person’s name is a common online activity. However, Web search engines provide few accurate results to queries containing names. In contrast to a general word that has only one correct spelling, there are several possible legitimate spellings when a name provided as a query. Today, most techniques used to suggest diminutives and alternative spellings in online search are based on pattern matching and phonetic encoding; however, they often perform poorly. As a result, there is a need for an effective tool for improved alternative name suggestion for a name provided as a query. In this paper, we propose a revolutionary approach for tackling the problem of alternative name suggestion. Our novel algorithm, GRAFT, utilizes historical data collected from genealogy websites, along with network algorithms. GRAFT is a general algorithm that suggests alternatives for input names using a graph based on names derived from digitized ancestral family trees. Alternative names are extracted from this graph, which is constructed using generic ordering functions that outperform other algorithms that suggest diminutives and alternative spellings based on a single dimension, a factor that limits their performance. We evaluated GRAFT’s performance on three ground truth datasets of forenames and surnames, including a large-scale online genealogy dataset with over 16 million profiles and more than 700,000 unique forenames and 500,000 surnames. We compared GRAFT’s performance at suggesting alternative names to the performance of 10 other algorithms, including phonetic encoding, string similarity, machine learning, and deep learning algorithms. The results show GRAFT’s superiority with regard to both forenames and surnames and demonstrate its use as a tool to improve alternative name suggestion.", "title": "It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees", "normalizedTitle": "It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees", "fno": "09495286", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Deep Learning Artificial Intelligence", "Graph Theory", "Internet", "Pattern Matching", "Query Processing", "Search Engines", "Search Problems", "Web Sites", "Alternative Spellings", "Digitized Ancestral Family Trees", "Generic Ordering Functions", "GRAFT", "Improved Alternative Name Suggestion", "Input Names", "Unsupervised Algorithm", "Web Search Engines", "Companies", "Vegetation", "Phonetics", "Machine Learning Algorithms", "Web Search", "Engines", "Encoding", "Alternative Name Suggestion", "Digitized Family Trees", "Networks", "Network Science", "Personal Names", "Name Based Graphs" ], "authors": [ { "givenName": "Aviad", "surname": "Elyashar", "fullName": "Aviad Elyashar", "affiliation": "Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel", "__typename": "ArticleAuthorType" }, { "givenName": "Rami", "surname": "Puzis", "fullName": "Rami Puzis", "affiliation": "Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel", "__typename": "ArticleAuthorType" }, { "givenName": "Michael", "surname": "Fire", "fullName": "Michael Fire", "affiliation": "Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2023-02-01 00:00:00", "pubType": "trans", "pages": "1651-1666", "year": "2023", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iiaiaai/2014/4174/0/06913366", "title": "Discovery of Implicit Feature Words of Place Name", "doi": null, "abstractUrl": "/proceedings-article/iiaiaai/2014/06913366/12OmNqIQS6x", "parentPublication": { "id": "proceedings/iiaiaai/2014/4174/0", "title": "2014 IIAI 3rd International Conference on Advanced Applied Informatics (IIAIAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2017/0604/0/0604a069", "title": "BF-PDT: A New Name Lookup Mechanism in Content-Centric Networking", "doi": null, "abstractUrl": "/proceedings-article/nana/2017/0604a069/12OmNwF0BXO", "parentPublication": { "id": "proceedings/nana/2017/0604/0", "title": "2017 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2004/832/0/01336139", "title": "Two supervised learning approaches for name disambiguation in author citations", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2004/01336139/12OmNwdtwdd", "parentPublication": { "id": "proceedings/jcdl/2004/832/0", "title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07840758", "title": "Fast, lenient and accurate: Building personalized instant search experience at LinkedIn", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840758/12OmNwlZu0O", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2017/0367/1/0367a643", "title": "DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names", "doi": null, "abstractUrl": "/proceedings-article/compsac/2017/0367a643/12OmNzVXNMT", "parentPublication": { "id": "proceedings/compsac/2017/0367/1", "title": "2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2012/2027/0/06266275", "title": "Contextual Dominant Color Name Extraction for Web Image Search", "doi": null, "abstractUrl": "/proceedings-article/icmew/2012/06266275/12OmNzdoMoy", "parentPublication": { "id": "proceedings/icmew/2012/2027/0", "title": "2012 IEEE International Conference on Multimedia & Expo Workshops (ICMEW 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2019/02/08673766", "title": "On the Granularity of Trie-Based Data Structures for Name Lookups and Updates", "doi": null, "abstractUrl": "/journal/nt/2019/02/08673766/18GGmISUatO", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2018/1360/0/136000a227", "title": "A Decision Tree Method on Fuzzy Name Identification from Chinese Phonemic Names to Chinese Names", "doi": null, "abstractUrl": "/proceedings-article/csci/2018/136000a227/1gjRp8Iu9KE", "parentPublication": { "id": "proceedings/csci/2018/1360/0", "title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09147044", "title": "A Collective Approach to Scholar Name Disambiguation", "doi": null, "abstractUrl": "/journal/tk/2022/05/09147044/1lIYCwlAKLS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09184992", "title": "CONNA: Addressing Name Disambiguation on the Fly", "doi": null, "abstractUrl": "/journal/tk/2022/07/09184992/1mNmO2ECo8w", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09508875", "articleId": "1vQzgK4tFdu", "__typename": "AdjacentArticleType" }, "next": { "fno": "09470948", "articleId": "1uSOyIhoces", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwpGgK8", "title": "Dec.", "year": "2014", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "20", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwh80Hd", "doi": "10.1109/TVCG.2014.2346444", "abstract": "The field of graph visualization has produced a wealth of visualization techniques for accomplishing a variety of analysis tasks. Therefore analysts often rely on a suite of different techniques, and visual graph analysis application builders strive to provide this breadth of techniques. To provide a holistic model for specifying network visualization techniques (as opposed to considering each technique in isolation) we present the Graph-Level Operations (GLO) model. We describe a method for identifying GLOs and apply it to identify five classes of GLOs, which can be flexibly combined to re-create six canonical graph visualization techniques. We discuss advantages of the GLO model, including potentially discovering new, effective network visualization techniques and easing the engineering challenges of building multi-technique graph visualization applications. Finally, we implement the GLOs that we identified into the GLO-STIX prototype system that enables an analyst to interactively explore a graph by applying GLOs.", "abstracts": [ { "abstractType": "Regular", "content": "The field of graph visualization has produced a wealth of visualization techniques for accomplishing a variety of analysis tasks. Therefore analysts often rely on a suite of different techniques, and visual graph analysis application builders strive to provide this breadth of techniques. To provide a holistic model for specifying network visualization techniques (as opposed to considering each technique in isolation) we present the Graph-Level Operations (GLO) model. We describe a method for identifying GLOs and apply it to identify five classes of GLOs, which can be flexibly combined to re-create six canonical graph visualization techniques. We discuss advantages of the GLO model, including potentially discovering new, effective network visualization techniques and easing the engineering challenges of building multi-technique graph visualization applications. Finally, we implement the GLOs that we identified into the GLO-STIX prototype system that enables an analyst to interactively explore a graph by applying GLOs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The field of graph visualization has produced a wealth of visualization techniques for accomplishing a variety of analysis tasks. Therefore analysts often rely on a suite of different techniques, and visual graph analysis application builders strive to provide this breadth of techniques. To provide a holistic model for specifying network visualization techniques (as opposed to considering each technique in isolation) we present the Graph-Level Operations (GLO) model. We describe a method for identifying GLOs and apply it to identify five classes of GLOs, which can be flexibly combined to re-create six canonical graph visualization techniques. We discuss advantages of the GLO model, including potentially discovering new, effective network visualization techniques and easing the engineering challenges of building multi-technique graph visualization applications. Finally, we implement the GLOs that we identified into the GLO-STIX prototype system that enables an analyst to interactively explore a graph by applying GLOs.", "title": "GLO-STIX: Graph-Level Operations for Specifying Techniques and Interactive eXploration", "normalizedTitle": "GLO-STIX: Graph-Level Operations for Specifying Techniques and Interactive eXploration", "fno": "06875969", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualisation", "Graph Theory", "Graphs", "Graph Level Operations", "Interactive Exploration", "Visual Graph Analysis Application", "Network Visualization Technique Specification", "Canonical Graph Visualization Techniques", "GLO STIX Prototype System", "Graph Theory", "Data Visualization", "Interactive Systems", "Semantics", "Aggregates", "Graph Level Operations", "Graph Visualization", "Visualization Technique Specification", "Graph Analysis", "Information Visualization" ], "authors": [ { "givenName": "Charles D.", "surname": "Stolper", "fullName": "Charles D. Stolper", "affiliation": "College of Computing, Georgia Institute of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Minsuk", "surname": "Kahng", "fullName": "Minsuk Kahng", "affiliation": "College of Computing, Georgia Institute of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Zhiyuan", "surname": "Lin", "fullName": "Zhiyuan Lin", "affiliation": "College of Computing, Georgia Institute of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Florian", "surname": "Foerster", "fullName": "Florian Foerster", "affiliation": "College of Computing, Georgia Institute of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Aakash", "surname": "Goel", "fullName": "Aakash Goel", "affiliation": "College of Computing, Georgia Institute of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "John", "surname": "Stasko", "fullName": "John Stasko", "affiliation": "College of Computing, Georgia Institute of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Duen Horng", "surname": "Chau", "fullName": "Duen Horng Chau", "affiliation": "College of Computing, Georgia Institute of Technology", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2014-12-01 00:00:00", "pubType": "trans", "pages": "2320-2328", "year": "2014", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vissoft/2005/9540/0/01684295", "title": "Interactive Exploration of UML Sequence Diagrams", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2005/01684295/12OmNAWH9Be", "parentPublication": { "id": "proceedings/vissoft/2005/9540/0", "title": "2005 3rd IEEE International Workshop on Visualizing Software for Understanding and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1999/5897/0/58970025", "title": "Interactive Lens Visualization Techniques", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1999/58970025/12OmNCeaPVK", "parentPublication": { "id": "proceedings/ieee-vis/1999/5897/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vizsec/2017/2693/0/08062203", "title": "STARLORD: Linked security data exploration in a 3D graph", "doi": null, "abstractUrl": "/proceedings-article/vizsec/2017/08062203/12OmNxAlAbr", "parentPublication": { "id": "proceedings/vizsec/2017/2693/0", "title": "2017 IEEE Symposium on Visualization for Cyber Security (VizSec)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2009/3883/0/3883a619", "title": "Visualization of Blog Network by a Keyword Based Graph with Interactive Filtering", "doi": null, "abstractUrl": "/proceedings-article/icig/2009/3883a619/12OmNxb5hth", "parentPublication": { "id": "proceedings/icig/2009/3883/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2017/01/mcg2017010027", "title": "Interactive Exploration of 3D Scanned Baggage", "doi": null, "abstractUrl": "/magazine/cg/2017/01/mcg2017010027/13rRUwbaqNY", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1998/11/t1297", "title": "Interactive Orthogonal Graph Drawing", "doi": null, "abstractUrl": "/journal/tc/1998/11/t1297/13rRUwfZBZo", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1414", "title": "TreePlus: Interactive Exploration of Networks with Enhanced Tree Layouts", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1414/13rRUwjXZS5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/05/ttg2012050810", "title": "Ambiguity-Free Edge-Bundling for Interactive Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2012/05/ttg2012050810/13rRUxASuby", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009060937", "title": "Interaction Techniques for Selecting and Manipulating Subgraphs in Network Visualizations", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009060937/13rRUzpzeB0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933546", "title": "Interactive Bicluster Aggregation in Bipartite Graphs", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933546/1fTgJv5NwT6", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06875972", "articleId": "13rRUwjGoG4", "__typename": "AdjacentArticleType" }, "next": { "fno": "06875942", "articleId": "13rRUwbJD4K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNAIMOaz", "title": "November", "year": "2006", "issueNum": "11", "idPrefix": "tk", "pubType": "journal", "volume": "18", "label": "November", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUy3xY8u", "doi": "10.1109/TKDE.2006.173", "abstract": "Whereas data mining in structured data focuses on frequent data values, in semistructured and graph data mining, the issue is frequent labels and common specific topologies. Here, the structure of the data is just as important as its content. We study the problem of discovering typical patterns of graph data, a task made difficult because of the complexity of required subtasks, especially subgraph isomorphism. In this paper, we propose a new Apriori-based algorithm for mining graph data, where the basic building blocks are relatively large, disjoint paths. The algorithm is proven to be sound and complete. Empirical evidence shows practical advantages of our approach for certain categories of graphs.", "abstracts": [ { "abstractType": "Regular", "content": "Whereas data mining in structured data focuses on frequent data values, in semistructured and graph data mining, the issue is frequent labels and common specific topologies. Here, the structure of the data is just as important as its content. We study the problem of discovering typical patterns of graph data, a task made difficult because of the complexity of required subtasks, especially subgraph isomorphism. In this paper, we propose a new Apriori-based algorithm for mining graph data, where the basic building blocks are relatively large, disjoint paths. The algorithm is proven to be sound and complete. Empirical evidence shows practical advantages of our approach for certain categories of graphs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Whereas data mining in structured data focuses on frequent data values, in semistructured and graph data mining, the issue is frequent labels and common specific topologies. Here, the structure of the data is just as important as its content. We study the problem of discovering typical patterns of graph data, a task made difficult because of the complexity of required subtasks, especially subgraph isomorphism. In this paper, we propose a new Apriori-based algorithm for mining graph data, where the basic building blocks are relatively large, disjoint paths. The algorithm is proven to be sound and complete. Empirical evidence shows practical advantages of our approach for certain categories of graphs.", "title": "Discovering Frequent Graph Patterns Using Disjoint Paths", "normalizedTitle": "Discovering Frequent Graph Patterns Using Disjoint Paths", "fno": "k1441", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Database Applications", "Data Mining", "Mining Methods And Algorithms", "Web Mining", "Graph Mining" ], "authors": [ { "givenName": "Ehud", "surname": "Gudes", "fullName": "Ehud Gudes", "affiliation": "IEEE Computer Society", "__typename": "ArticleAuthorType" }, { "givenName": "Solomon Eyal", "surname": "Shimony", "fullName": "Solomon Eyal Shimony", "affiliation": "IEEE Computer Society", "__typename": "ArticleAuthorType" }, { "givenName": "Natalia", "surname": "Vanetik", "fullName": "Natalia Vanetik", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2006-11-01 00:00:00", "pubType": "trans", "pages": "1441-1456", "year": "2006", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icmla/2008/3495/0/3495a871", "title": "Mining of Frequent Externally Extensible Outerplanar Graph Patterns", "doi": null, "abstractUrl": "/proceedings-article/icmla/2008/3495a871/12OmNAsk4EM", "parentPublication": { "id": "proceedings/icmla/2008/3495/0", "title": "2008 Seventh International Conference on Machine Learning and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2009/4830/0/05255089", "title": "A fast parallel algorithm for discovering frequent patterns", "doi": null, "abstractUrl": "/proceedings-article/grc/2009/05255089/12OmNBgz4Ab", "parentPublication": { "id": "proceedings/grc/2009/4830/0", "title": "2009 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsitt/2005/216/0/01593465", "title": "Mining frequent patterns from XML data", "doi": null, "abstractUrl": "/proceedings-article/apsitt/2005/01593465/12OmNC4eSrQ", "parentPublication": { "id": "proceedings/apsitt/2005/216/0", "title": "6th Asia-Pacific Symposium on Information and Telecommunication Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/5/3735e114", "title": "JPMiner: Mining Frequent Jump Patterns from Graph Databases", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735e114/12OmNyeECCh", "parentPublication": { "id": "proceedings/fskd/2009/3735/5", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/4/3336g354", "title": "An Efficient Approach for Mining Frequent Patterns Based on Traversing a Frequent Pattern Tree", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336g354/12OmNznkJVe", "parentPublication": { "id": "csse/2008/3336/4", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2009/3895/0/3895a239", "title": "Efficient Discovery of Frequent Correlated Subgraph Pairs", "doi": null, "abstractUrl": "/proceedings-article/icdm/2009/3895a239/12OmNzxPTMV", "parentPublication": { "id": "proceedings/icdm/2009/3895/0", "title": "2009 Ninth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2000/03/k0353", "title": "Discovering Structural Association of Semistructured Data", "doi": null, "abstractUrl": "/journal/tk/2000/03/k0353/13rRUygT7yo", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2010/09/ttk2010091203", "title": "Mining Frequent Subgraph Patterns from Uncertain Graph Data", "doi": null, "abstractUrl": "/journal/tk/2010/09/ttk2010091203/13rRUyoPSPr", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/02/08349950", "title": "Efficient Mining of Frequent Patterns on Uncertain Graphs", "doi": null, "abstractUrl": "/journal/tk/2019/02/08349950/17D45WrVgbP", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2021/3858/0/385800a253", "title": "UFreS: A New Technique for Discovering Frequent Subgraph Patterns in Uncertain Graph Databases", "doi": null, "abstractUrl": "/proceedings-article/icbk/2021/385800a253/1A9X6wLPxBK", "parentPublication": { "id": "proceedings/icbk/2021/3858/0", "title": "2021 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": null, "next": { "fno": "k1457", "articleId": "13rRUNvya9u", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxdm4Ew", "title": "March", "year": "2016", "issueNum": "03", "idPrefix": "tk", "pubType": "journal", "volume": "28", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUygBw7w", "doi": "10.1109/TKDE.2015.2492567", "abstract": "Graph classification aims to learn models to classify structure data. To date, all existing graph classification methods are designed to target one single learning task and require a large number of labeled samples for learning good classification models. In reality, each real-world task may only have a limited number of labeled samples, yet multiple similar learning tasks can provide useful knowledge to benefit all tasks as a whole. In this paper, we formulate a new multi-task graph classification (MTG) problem, where multiple graph classification tasks are jointly regularized to find discriminative subgraphs shared by all tasks for learning. The niche of MTG stems from the fact that with a limited number of training samples, subgraph features selected for one single graph classification task tend to overfit the training data. By using additional tasks as evaluation sets, MTG can jointly regularize multiple tasks to explore high quality subgraph features for graph classification. To achieve this goal, we formulate an objective function which combines multiple graph classification tasks to evaluate the informativeness score of a subgraph feature. An iterative subgraph feature exploration and multi-task learning process is further proposed to incrementally select subgraph features for graph classification. Experiments on real-world multi-task graph classification datasets demonstrate significant performance gain.", "abstracts": [ { "abstractType": "Regular", "content": "Graph classification aims to learn models to classify structure data. To date, all existing graph classification methods are designed to target one single learning task and require a large number of labeled samples for learning good classification models. In reality, each real-world task may only have a limited number of labeled samples, yet multiple similar learning tasks can provide useful knowledge to benefit all tasks as a whole. In this paper, we formulate a new multi-task graph classification (MTG) problem, where multiple graph classification tasks are jointly regularized to find discriminative subgraphs shared by all tasks for learning. The niche of MTG stems from the fact that with a limited number of training samples, subgraph features selected for one single graph classification task tend to overfit the training data. By using additional tasks as evaluation sets, MTG can jointly regularize multiple tasks to explore high quality subgraph features for graph classification. To achieve this goal, we formulate an objective function which combines multiple graph classification tasks to evaluate the informativeness score of a subgraph feature. An iterative subgraph feature exploration and multi-task learning process is further proposed to incrementally select subgraph features for graph classification. Experiments on real-world multi-task graph classification datasets demonstrate significant performance gain.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph classification aims to learn models to classify structure data. To date, all existing graph classification methods are designed to target one single learning task and require a large number of labeled samples for learning good classification models. In reality, each real-world task may only have a limited number of labeled samples, yet multiple similar learning tasks can provide useful knowledge to benefit all tasks as a whole. In this paper, we formulate a new multi-task graph classification (MTG) problem, where multiple graph classification tasks are jointly regularized to find discriminative subgraphs shared by all tasks for learning. The niche of MTG stems from the fact that with a limited number of training samples, subgraph features selected for one single graph classification task tend to overfit the training data. By using additional tasks as evaluation sets, MTG can jointly regularize multiple tasks to explore high quality subgraph features for graph classification. To achieve this goal, we formulate an objective function which combines multiple graph classification tasks to evaluate the informativeness score of a subgraph feature. An iterative subgraph feature exploration and multi-task learning process is further proposed to incrementally select subgraph features for graph classification. Experiments on real-world multi-task graph classification datasets demonstrate significant performance gain.", "title": "Joint Structure Feature Exploration and Regularization for Multi-Task Graph Classification", "normalizedTitle": "Joint Structure Feature Exploration and Regularization for Multi-Task Graph Classification", "fno": "07302040", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Training", "Linear Programming", "Accuracy", "Loss Measurement", "Data Models", "Chemical Compounds", "Data Mining", "Supervised Learning", "Graph Classification", "Subgraph Features", "Regularization", "Multi Task Learning", "Supervised Learning", "Graph Classification", "Subgraph Features", "Regularization", "Multi Task Learning" ], "authors": [ { "givenName": "Shirui", "surname": "Pan", "fullName": "Shirui Pan", "affiliation": "Centre for Quantum Computation and Intelligent Systems, FEIT, University of Technology Sydney, N.S.W., Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Jia", "surname": "Wu", "fullName": "Jia Wu", "affiliation": "Centre for Quantum Computation and Intelligent Systems, FEIT, University of Technology Sydney, N.S.W., Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Xingquan", "surname": "Zhu", "fullName": "Xingquan Zhu", "affiliation": "Department of Computer and Electrical Engineering and Computer Science, Florida Atlantic University, Boca Raton, FL", "__typename": "ArticleAuthorType" }, { "givenName": "Chengqi", "surname": "Zhang", "fullName": "Chengqi Zhang", "affiliation": "Centre for Quantum Computation and Intelligent Systems, FEIT, University of Technology Sydney, N.S.W., Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Philip S.", "surname": "Yu", "fullName": "Philip S. Yu", "affiliation": "Department of Computer Science, University of Illinois at Chicago, Chicago, IL", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2016-03-01 00:00:00", "pubType": "trans", "pages": "715-728", "year": "2016", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2010/8306/0/05706643", "title": "Feature selection for graph kernels", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706643/12OmNsdo6rx", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2016/2020/0/07498381", "title": "Joint structure feature exploration and regularization for multi-task graph classification", "doi": null, "abstractUrl": "/proceedings-article/icde/2016/07498381/12OmNvjQ8Pj", "parentPublication": { "id": "proceedings/icde/2016/2020/0", "title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2015/9504/0/9504a709", "title": "Mining Brain Networks Using Multiple Side Views for Neurological Disorder Identification", "doi": null, "abstractUrl": "/proceedings-article/icdm/2015/9504a709/12OmNyQYtxL", "parentPublication": { "id": "proceedings/icdm/2015/9504/0", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2013/4909/0/06544842", "title": "Graph stream classification using labeled and unlabeled graphs", "doi": null, "abstractUrl": "/proceedings-article/icde/2013/06544842/12OmNylboFn", "parentPublication": { "id": "proceedings/icde/2013/4909/0", "title": "2013 29th IEEE International Conference on Data Engineering (ICDE 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2013/5048/0/5048a876", "title": "Using Cross-Task Classification for Classifying Workload Levels in Complex Learning Tasks", "doi": null, "abstractUrl": "/proceedings-article/acii/2013/5048a876/12OmNzVGcDa", "parentPublication": { "id": "proceedings/acii/2013/5048/0", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2005/08/k1036", "title": "Frequent Substructure-Based Approaches for Classifying Chemical Compounds", "doi": null, "abstractUrl": "/journal/tk/2005/08/k1036/13rRUNvgz4C", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/05/08186208", "title": "Z_$K$_Z -Ary Tree Hashing for Fast Graph Classification", "doi": null, "abstractUrl": "/journal/tk/2018/05/08186208/13rRUxASuAX", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/admit/2022/5472/0/547200a104", "title": "High-Order Subgraph Convolution Networks with Auxiliary Self-Supervised Task for Recommendation", "doi": null, "abstractUrl": "/proceedings-article/admit/2022/547200a104/1J9B62ljCF2", "parentPublication": { "id": "proceedings/admit/2022/5472/0", "title": "2022 International Conference on Algorithms, Data Mining, and Information Technology (ADMIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995575", "title": "Discriminative Graph Representation Learning with Distributed Sampling", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995575/1JC2Ksg7Mac", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020980", "title": "Leveraging Subgraph Structure for Exploration and Analysis of Bitcoin Address", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020980/1KfSjxmJa9i", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07323847", "articleId": "13rRUxYIMVC", "__typename": "AdjacentArticleType" }, "next": { "fno": "07303952", "articleId": "13rRUNvyalj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXWRXX", "name": "ttk201603-07302040s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttk201603-07302040s1.zip", "extension": "zip", "size": "82.3 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNAZx8Ot", "title": "July", "year": "2013", "issueNum": "07", "idPrefix": "tk", "pubType": "journal", "volume": "25", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxASuMX", "doi": "10.1109/TKDE.2012.101", "abstract": "Clustering has been a subject of extensive research in data mining, pattern recognition, and other areas for several decades. The main goal is to assign samples, which are typically non-Gaussian and expressed as points in high-dimensional feature spaces, to one of a number of clusters. It is well known that in such high-dimensional settings, the existence of irrelevant features generally compromises modeling capabilities. In this paper, we propose a variational inference framework for unsupervised non-Gaussian feature selection, in the context of finite generalized Dirichlet (GD) mixture-based clustering. Under the proposed principled variational framework, we simultaneously estimate, in a closed form, all the involved parameters and determine the complexity (i.e., both model an feature selection) of the GD mixture. Extensive simulations using synthetic data along with an analysis of real-world data and human action videos demonstrate that our variational approach achieves better results than comparable techniques.", "abstracts": [ { "abstractType": "Regular", "content": "Clustering has been a subject of extensive research in data mining, pattern recognition, and other areas for several decades. The main goal is to assign samples, which are typically non-Gaussian and expressed as points in high-dimensional feature spaces, to one of a number of clusters. It is well known that in such high-dimensional settings, the existence of irrelevant features generally compromises modeling capabilities. In this paper, we propose a variational inference framework for unsupervised non-Gaussian feature selection, in the context of finite generalized Dirichlet (GD) mixture-based clustering. Under the proposed principled variational framework, we simultaneously estimate, in a closed form, all the involved parameters and determine the complexity (i.e., both model an feature selection) of the GD mixture. Extensive simulations using synthetic data along with an analysis of real-world data and human action videos demonstrate that our variational approach achieves better results than comparable techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Clustering has been a subject of extensive research in data mining, pattern recognition, and other areas for several decades. The main goal is to assign samples, which are typically non-Gaussian and expressed as points in high-dimensional feature spaces, to one of a number of clusters. It is well known that in such high-dimensional settings, the existence of irrelevant features generally compromises modeling capabilities. In this paper, we propose a variational inference framework for unsupervised non-Gaussian feature selection, in the context of finite generalized Dirichlet (GD) mixture-based clustering. Under the proposed principled variational framework, we simultaneously estimate, in a closed form, all the involved parameters and determine the complexity (i.e., both model an feature selection) of the GD mixture. Extensive simulations using synthetic data along with an analysis of real-world data and human action videos demonstrate that our variational approach achieves better results than comparable techniques.", "title": "Unsupervised Hybrid Feature Extraction Selection for High-Dimensional Non-Gaussian Data Clustering with Variational Inference", "normalizedTitle": "Unsupervised Hybrid Feature Extraction Selection for High-Dimensional Non-Gaussian Data Clustering with Variational Inference", "fno": "ttk2013071670", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Data Models", "Bayesian Methods", "Vectors", "Approximation Methods", "Data Mining", "Feature Extraction", "Human Action Videos", "Mixture Models", "Unsupervised Learning", "Generalized Dirichlet", "Model Selection", "Feature Selection", "Bayesian Estimation", "Variational Inference" ], "authors": [ { "givenName": "Wentao", "surname": "Fan", "fullName": "Wentao Fan", "affiliation": "Concordia University, Montreal", "__typename": "ArticleAuthorType" }, { "givenName": "Nizar", "surname": "Bouguila", "fullName": "Nizar Bouguila", "affiliation": "Concordia University, Montreal", "__typename": "ArticleAuthorType" }, { "givenName": "Djemel", "surname": "Ziou", "fullName": "Djemel Ziou", "affiliation": "Université de Sherbrooke, Sherbrooke", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2013-07-01 00:00:00", "pubType": "trans", "pages": "1670-1685", "year": "2013", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icassp/2004/8484/1/01326035", "title": "Variational Bayesian feature selection for Gaussian mixture models", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01326035/12OmNCgJe3k", "parentPublication": { "id": "proceedings/icassp/2004/8484/1", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408b032", "title": "Unsupervised Anomaly Intrusion Detection via Localized Bayesian Feature Selection", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408b032/12OmNxGAL0M", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icapr/2009/3520/0/3520a183", "title": "Variational Gaussian Mixture Models for Speech Emotion Recognition", "doi": null, "abstractUrl": "/proceedings-article/icapr/2009/3520a183/12OmNxZkhvg", "parentPublication": { "id": "proceedings/icapr/2009/3520/0", "title": "Advances in Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04760983", "title": "Parameter-based reduction of Gaussian mixture models with a variational-Bayes approach", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04760983/12OmNyp9MhP", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761128", "title": "Localized feature selection for Gaussian mixtures using variational learning", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761128/12OmNzmclHM", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2012/4858/0/4858a567", "title": "The Infinite Hidden Markov Random Field Model Based on Student's t-Distribution", "doi": null, "abstractUrl": "/proceedings-article/cit/2012/4858a567/12OmNzwpUdD", "parentPublication": { "id": "proceedings/cit/2012/4858/0", "title": "Computer and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2009/08/ttp2009081429", "title": "A Hybrid Feature Extraction Selection Approach for High-Dimensional Non-Gaussian Data Clustering", "doi": null, "abstractUrl": "/journal/tp/2009/08/ttp2009081429/13rRUwwsltQ", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2009/05/ttp2009050953", "title": "Simultaneous Localized Feature Selection and Model Detection for Gaussian Mixtures", "doi": null, "abstractUrl": "/journal/tp/2009/05/ttp2009050953/13rRUxDqS5b", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2006/06/i1013", "title": "Bayesian Feature and Model Selection for Gaussian Mixture Models", "doi": null, "abstractUrl": "/journal/tp/2006/06/i1013/13rRUxlgxUq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2018/5035/0/08622120", "title": "A Unified Unsupervised Gaussian Mixture Variational Autoencoder for High Dimensional Outlier Detection", "doi": null, "abstractUrl": "/proceedings-article/big-data/2018/08622120/17D45VUZMXj", "parentPublication": { "id": "proceedings/big-data/2018/5035/0", "title": "2018 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttk2013071656", "articleId": "13rRUNvgzai", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTYesWA", "name": "ttk2013071670s1.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttk2013071670s1.pdf", "extension": "pdf", "size": "117 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNy3iFob", "title": "March", "year": "2016", "issueNum": "03", "idPrefix": "tp", "pubType": "journal", "volume": "38", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyv53GC", "doi": "10.1109/TPAMI.2015.2462360", "abstract": "Low-rank representation (LRR) has recently attracted a great deal of attention due to its pleasing efficacy in exploring low-dimensional subspace structures embedded in data. For a given set of observed data corrupted with sparse errors, LRR aims at learning a lowest-rank representation of all data jointly. LRR has broad applications in pattern recognition, computer vision and signal processing. In the real world, data often reside on low-dimensional manifolds embedded in a high-dimensional ambient space. However, the LRR method does not take into account the non-linear geometric structures within data, thus the locality and similarity information among data may be missing in the learning process. To improve LRR in this regard, we propose a general Laplacian regularized low-rank representation framework for data representation where a hypergraph Laplacian regularizer can be readily introduced into, i.e., a Non-negative Sparse Hyper-Laplacian regularized LRR model (NSHLRR). By taking advantage of the graph regularizer, our proposed method not only can represent the global low-dimensional structures, but also capture the intrinsic non-linear geometric information in data. The extensive experimental results on image clustering, semi-supervised image classification and dimensionality reduction tasks demonstrate the effectiveness of the proposed method.", "abstracts": [ { "abstractType": "Regular", "content": "Low-rank representation (LRR) has recently attracted a great deal of attention due to its pleasing efficacy in exploring low-dimensional subspace structures embedded in data. For a given set of observed data corrupted with sparse errors, LRR aims at learning a lowest-rank representation of all data jointly. LRR has broad applications in pattern recognition, computer vision and signal processing. In the real world, data often reside on low-dimensional manifolds embedded in a high-dimensional ambient space. However, the LRR method does not take into account the non-linear geometric structures within data, thus the locality and similarity information among data may be missing in the learning process. To improve LRR in this regard, we propose a general Laplacian regularized low-rank representation framework for data representation where a hypergraph Laplacian regularizer can be readily introduced into, i.e., a Non-negative Sparse Hyper-Laplacian regularized LRR model (NSHLRR). By taking advantage of the graph regularizer, our proposed method not only can represent the global low-dimensional structures, but also capture the intrinsic non-linear geometric information in data. The extensive experimental results on image clustering, semi-supervised image classification and dimensionality reduction tasks demonstrate the effectiveness of the proposed method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Low-rank representation (LRR) has recently attracted a great deal of attention due to its pleasing efficacy in exploring low-dimensional subspace structures embedded in data. For a given set of observed data corrupted with sparse errors, LRR aims at learning a lowest-rank representation of all data jointly. LRR has broad applications in pattern recognition, computer vision and signal processing. In the real world, data often reside on low-dimensional manifolds embedded in a high-dimensional ambient space. However, the LRR method does not take into account the non-linear geometric structures within data, thus the locality and similarity information among data may be missing in the learning process. To improve LRR in this regard, we propose a general Laplacian regularized low-rank representation framework for data representation where a hypergraph Laplacian regularizer can be readily introduced into, i.e., a Non-negative Sparse Hyper-Laplacian regularized LRR model (NSHLRR). By taking advantage of the graph regularizer, our proposed method not only can represent the global low-dimensional structures, but also capture the intrinsic non-linear geometric information in data. The extensive experimental results on image clustering, semi-supervised image classification and dimensionality reduction tasks demonstrate the effectiveness of the proposed method.", "title": "Laplacian Regularized Low-Rank Representation and Its Applications", "normalizedTitle": "Laplacian Regularized Low-Rank Representation and Its Applications", "fno": "07172559", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Manifolds", "Laplace Equations", "Data Models", "Principal Component Analysis", "Dictionaries", "Robustness", "Optimization", "Regularization", "Low Rank Representation", "Graph", "Hyper Laplacian", "Manifold Structure", "Laplacian Matrix", "Regularization", "Low Rank Representation Graph Hyper Laplacian", "Manifold Structure", "Laplacian Matrix" ], "authors": [ { "givenName": "Ming", "surname": "Yin", "fullName": "Ming Yin", "affiliation": "School of Automation, Guangdong University of Technology, Guangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Junbin", "surname": "Gao", "fullName": "Junbin Gao", "affiliation": "School of Computing and Mathematics, Charles Sturt University, Bathurst, N.S.W., Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Zhouchen", "surname": "Lin", "fullName": "Zhouchen Lin", "affiliation": "Key Laboratory of Machine Perception (MOE), School of EECS, Peking University, Beijing, P.R. China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2016-03-01 00:00:00", "pubType": "trans", "pages": "504-517", "year": "2016", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457h053", "title": "A Graph Regularized Deep Neural Network for Unsupervised Image Representation Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457h053/12OmNASraM6", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2015/6683/0/6683a542", "title": "Unsupervised Feature Extraction Inspired by Latent Low-Rank Representation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2015/6683a542/12OmNrMHOfu", "parentPublication": { "id": "proceedings/wacv/2015/6683/0", "title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761254", "title": "Local Regularized Least-Square Dimensionality Reduction", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761254/12OmNviZlgj", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/01/ttp2013010171", "title": "Robust Recovery of Subspace Structures by Low-Rank Representation", "doi": null, "abstractUrl": "/journal/tp/2013/01/ttp2013010171/13rRUwfZBWp", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2018/7445/0/744500a092", "title": "Graph Regularized Low-Rank Representation for Semi-Supervised Learning", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2018/744500a092/17D45VtKizl", "parentPublication": { "id": "proceedings/dcabes/2018/7445/0", "title": "2018 17th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/01/08094872", "title": "A Mixed-Norm Laplacian Regularized Low-Rank Representation Method for Tumor Samples Clustering", "doi": null, "abstractUrl": "/journal/tb/2019/01/08094872/17D45W1Oa5h", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2018/5321/0/08499082", "title": "LR<sup>2</sup>-SR: Laplacian Regularized Low-Rank Sparse Representation for Single Image Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2018/08499082/17D45X0yjSg", "parentPublication": { "id": "proceedings/bigmm/2018/5321/0", "title": "2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/09/08693535", "title": "Feature Selective Projection with Low-Rank Embedding and Dual Laplacian Regularization", "doi": null, "abstractUrl": "/journal/tk/2020/09/08693535/19iRbOuhl9C", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995009", "title": "A Multi-Graph Laplacian Regularized Low-Rank Representation method for cancer sample clustering with integrated TCGA data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995009/1JC1R6GfxT2", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icii/2019/2977/0/297700a077", "title": "Research on Image Data Clustering Algorithm Based on Low Rank Subspace Clustering", "doi": null, "abstractUrl": "/proceedings-article/icii/2019/297700a077/1jXvh37dmSI", "parentPublication": { "id": "proceedings/icii/2019/2977/0", "title": "2019 IEEE International Conference on Industrial Internet (ICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07164339", "articleId": "13rRUEgaru3", "__typename": "AdjacentArticleType" }, "next": { "fno": "07172530", "articleId": "13rRUB7a1h4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzZ5oaF", "title": "July", "year": "2020", "issueNum": "07", "idPrefix": "tk", "pubType": "journal", "volume": "32", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "18exlaKcvHq", "doi": "10.1109/TKDE.2019.2904065", "abstract": "The top-k dominating (TKD) query on skyline groups returns k skyline groups that dominate the maximum number of points in a given data set. The TKD query combines the advantages of skyline groups and top-k dominating queries, thus has been frequently used in decision making, recommendation systems, and quantitative economics. Traditional skylines are inadequate to answer queries from both individual and groups of points. The group size could be too large to be processed in a reasonable time as a single operator (i.e., the skyline group operator). In this paper, we address the performance problem of grouping for TKD queries in skyline database. We formulate the problem of grouping, define the group operator in skyline, and propose several efficient algorithms to find top-k skyline groups. Thus, we provide a systematic study of TKD queries on skyline groups and validate our algorithms with extensive empirical results on synthetic and realworld data.", "abstracts": [ { "abstractType": "Regular", "content": "The top-k dominating (TKD) query on skyline groups returns k skyline groups that dominate the maximum number of points in a given data set. The TKD query combines the advantages of skyline groups and top-k dominating queries, thus has been frequently used in decision making, recommendation systems, and quantitative economics. Traditional skylines are inadequate to answer queries from both individual and groups of points. The group size could be too large to be processed in a reasonable time as a single operator (i.e., the skyline group operator). In this paper, we address the performance problem of grouping for TKD queries in skyline database. We formulate the problem of grouping, define the group operator in skyline, and propose several efficient algorithms to find top-k skyline groups. Thus, we provide a systematic study of TKD queries on skyline groups and validate our algorithms with extensive empirical results on synthetic and realworld data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The top-k dominating (TKD) query on skyline groups returns k skyline groups that dominate the maximum number of points in a given data set. The TKD query combines the advantages of skyline groups and top-k dominating queries, thus has been frequently used in decision making, recommendation systems, and quantitative economics. Traditional skylines are inadequate to answer queries from both individual and groups of points. The group size could be too large to be processed in a reasonable time as a single operator (i.e., the skyline group operator). In this paper, we address the performance problem of grouping for TKD queries in skyline database. We formulate the problem of grouping, define the group operator in skyline, and propose several efficient algorithms to find top-k skyline groups. Thus, we provide a systematic study of TKD queries on skyline groups and validate our algorithms with extensive empirical results on synthetic and realworld data.", "title": "Top-<italic>k</italic> Dominating Queries on Skyline Groups", "normalizedTitle": "Top-k Dominating Queries on Skyline Groups", "fno": "08663344", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Decision Making", "Query Processing", "Recommender Systems", "Skyline Database", "Skyline Group Returns", "Skyline Group Operator", "Group Size", "TKD Query", "Top K Dominating Query", "Indexes", "Aggregates", "Decision Making", "Economics", "Systematics", "Query Processing", "Top-<inline-formula xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"> <tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math> </inline-formula> dominating queries", "Skyline Queries", "Skyline Groups", "Query Processing" ], "authors": [ { "givenName": "Haoyang", "surname": "Zhu", "fullName": "Haoyang Zhu", "affiliation": "Institute of Systems Engineering, Academy of Military Sciences, People's Liberation Army, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaoyong", "surname": "Li", "fullName": "Xiaoyong Li", "affiliation": "College of Meteorology and Oceanography, National University of Defense Technology, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Qiang", "surname": "Liu", "fullName": "Qiang Liu", "affiliation": "College of Computer, National University of Defense Technology, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zichen", "surname": "Xu", "fullName": "Zichen Xu", "affiliation": "College of Computer Science and Technology, Nanchang University, Nanchang, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2020-07-01 00:00:00", "pubType": "trans", "pages": "1431-1444", "year": "2020", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdew/2008/2161/0/04498313", "title": "Skyline-join in distributed databases", "doi": null, "abstractUrl": "/proceedings-article/icdew/2008/04498313/12OmNASraR9", "parentPublication": { "id": "proceedings/icdew/2008/2161/0", "title": "2008 IEEE 24th International Conference on Data Engineering Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2016/4320/0/07945620", "title": "Imperfect top-k skyline query with confidence level", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2016/07945620/12OmNvrvj8d", "parentPublication": { "id": "proceedings/aiccsa/2016/4320/0", "title": "2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgc/2012/3027/0/06382907", "title": "A Partitioned-Based Method of Convex Skyline for Efficient Processing Top-k Queries", "doi": null, "abstractUrl": "/proceedings-article/cgc/2012/06382907/12OmNzDvShi", "parentPublication": { "id": "proceedings/cgc/2012/3027/0", "title": "2012 International Conference on Cloud and Green Computing (CGC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/01/07166329", "title": "Top-k Dominating Queries on Incomplete Data", "doi": null, "abstractUrl": "/journal/tk/2016/01/07166329/13rRUEgs2Mn", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/04/08120106", "title": "Efficient Computation of G-Skyline Groups", "doi": null, "abstractUrl": "/journal/tk/2018/04/08120106/13rRUwInvth", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/04/06559976", "title": "On Skyline Groups", "doi": null, "abstractUrl": "/journal/tk/2014/04/06559976/13rRUyYjKaP", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2018/5520/0/552000a653", "title": "Skyline Diagram: Finding the Voronoi Counterpart for Skyline Queries", "doi": null, "abstractUrl": "/proceedings-article/icde/2018/552000a653/14Fq0VFPGar", "parentPublication": { "id": "proceedings/icde/2018/5520/0", "title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0/945700a551", "title": "Secure Skyline Groups Queries on Encrypted Data on Cloud Platform", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2021/945700a551/1DNDPKSQ3ba", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0", "title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/07/08935189", "title": "Group-Based Skyline for Pareto Optimal Groups", "doi": null, "abstractUrl": "/journal/tk/2021/07/08935189/1fPUaL4Ju8w", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2020/1924/0/192400a299", "title": "Morph-Skyline: Virtual Ontology-Based Data Access for Skyline Queries", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2020/192400a299/1uHhgYXYNLa", "parentPublication": { "id": "proceedings/wi-iat/2020/1924/0", "title": "2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08664197", "articleId": "1koKWHZhVvO", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxwENE0", "title": "May", "year": "2016", "issueNum": "05", "idPrefix": "tp", "pubType": "journal", "volume": "38", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUy3xY9j", "doi": "10.1109/TPAMI.2015.2469286", "abstract": "In this study, we show that landmark detection or face alignment task is not a single and independent problem. Instead, its robustness can be greatly improved with auxiliary information. Specifically, we jointly optimize landmark detection together with the recognition of heterogeneous but subtly correlated facial attributes, such as gender, expression, and appearance attributes. This is non-trivial since different attribute inference tasks have different learning difficulties and convergence rates. To address this problem, we formulate a novel tasks-constrained deep model, which not only learns the inter-task correlation but also employs dynamic task coefficients to facilitate the optimization convergence when learning multiple complex tasks. Extensive evaluations show that the proposed task-constrained learning (i) outperforms existing face alignment methods, especially in dealing with faces with severe occlusion and pose variation, and (ii) reduces model complexity drastically compared to the state-of-the-art methods based on cascaded deep model.", "abstracts": [ { "abstractType": "Regular", "content": "In this study, we show that landmark detection or face alignment task is not a single and independent problem. Instead, its robustness can be greatly improved with auxiliary information. Specifically, we jointly optimize landmark detection together with the recognition of heterogeneous but subtly correlated facial attributes, such as gender, expression, and appearance attributes. This is non-trivial since different attribute inference tasks have different learning difficulties and convergence rates. To address this problem, we formulate a novel tasks-constrained deep model, which not only learns the inter-task correlation but also employs dynamic task coefficients to facilitate the optimization convergence when learning multiple complex tasks. Extensive evaluations show that the proposed task-constrained learning (i) outperforms existing face alignment methods, especially in dealing with faces with severe occlusion and pose variation, and (ii) reduces model complexity drastically compared to the state-of-the-art methods based on cascaded deep model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this study, we show that landmark detection or face alignment task is not a single and independent problem. Instead, its robustness can be greatly improved with auxiliary information. Specifically, we jointly optimize landmark detection together with the recognition of heterogeneous but subtly correlated facial attributes, such as gender, expression, and appearance attributes. This is non-trivial since different attribute inference tasks have different learning difficulties and convergence rates. To address this problem, we formulate a novel tasks-constrained deep model, which not only learns the inter-task correlation but also employs dynamic task coefficients to facilitate the optimization convergence when learning multiple complex tasks. Extensive evaluations show that the proposed task-constrained learning (i) outperforms existing face alignment methods, especially in dealing with faces with severe occlusion and pose variation, and (ii) reduces model complexity drastically compared to the state-of-the-art methods based on cascaded deep model.", "title": "Learning Deep Representation for Face Alignment with Auxiliary Attributes", "normalizedTitle": "Learning Deep Representation for Face Alignment with Auxiliary Attributes", "fno": "07208848", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Face", "Training", "Convergence", "Covariance Matrices", "Correlation", "Gaussian Distribution", "Glass", "Convolutional Network", "Face Alignment", "Face Landmark Detection", "Deep Learning", "Convolutional Network", "Face Alignment", "Face Landmark Detection", "Deep Learning" ], "authors": [ { "givenName": "Zhanpeng", "surname": "Zhang", "fullName": "Zhanpeng Zhang", "affiliation": "Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Ping", "surname": "Luo", "fullName": "Ping Luo", "affiliation": "Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Chen Change", "surname": "Loy", "fullName": "Chen Change Loy", "affiliation": "Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaoou", "surname": "Tang", "fullName": "Xiaoou Tang", "affiliation": "Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2016-05-01 00:00:00", "pubType": "trans", "pages": "918-930", "year": "2016", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2017/1034/0/1034b619", "title": "Dense Face Alignment", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034b619/12OmNwF0C4S", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2013/4989/0/4989c291", "title": "Correlation Filters for Object Alignment", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2013/4989c291/12OmNwe2IBo", "parentPublication": { "id": "proceedings/cvpr/2013/4989/0", "title": "2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034b599", "title": "FacePoseNet: Making a Case for Landmark-Free Face Alignment", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034b599/12OmNwpoFCL", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2015/6683/0/6683a162", "title": "Face Alignment Refinement", "doi": null, "abstractUrl": "/proceedings-article/wacv/2015/6683a162/12OmNy49sPK", "parentPublication": { "id": "proceedings/wacv/2015/6683/0", "title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956683", "title": "ACR Loss: Adaptive Coordinate-based Regression Loss for Face Alignment", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956683/1IHozV3bKfK", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g991", "title": "Face Alignment With Kernel Density Deep Neural Network", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g991/1hVlBgdr39e", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300a778", "title": "UGLLI Face Alignment: Estimating Uncertainty with Gaussian Log-Likelihood Loss", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300a778/1i5mD4Vpsas", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2020/3079/0/307900a253", "title": "Deep Entwined Learning Head Pose and Face Alignment Inside an Attentional Cascade with Doubly-Conditional fusion", "doi": null, "abstractUrl": "/proceedings-article/fg/2020/307900a253/1kecI4Z0oSY", "parentPublication": { "id": "proceedings/fg/2020/3079/0/", "title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i233", "title": "LUVLi Face Alignment: Estimating Landmarks&#x2019; Location, Uncertainty, and Visibility Likelihood", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i233/1m3nDIlnmhO", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900b521", "title": "ASMNet: a Lightweight Deep Neural Network for Face Alignment and Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900b521/1yXsIWhifv2", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07226831", "articleId": "13rRUwgQprU", "__typename": "AdjacentArticleType" }, "next": { "fno": "07206595", "articleId": "13rRUxOveb2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNCbCrUN", "title": "Dec.", "year": "2013", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "19", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyYSWkX", "doi": "10.1109/TVCG.2013.124", "abstract": "The considerable previous work characterizing visualization usage has focused on low-level tasks or interactions and high-level tasks, leaving a gap between them that is not addressed. This gap leads to a lack of distinction between the ends and means of a task, limiting the potential for rigorous analysis. We contribute a multi-level typology of visualization tasks to address this gap, distinguishing why and how a visualization task is performed, as well as what the task inputs and outputs are. Our typology allows complex tasks to be expressed as sequences of interdependent simpler tasks, resulting in concise and flexible descriptions for tasks of varying complexity and scope. It provides abstract rather than domain-specific descriptions of tasks, so that useful comparisons can be made between visualization systems targeted at different application domains. This descriptive power supports a level of analysis required for the generation of new designs, by guiding the translation of domain-specific problems into abstract tasks, and for the qualitative evaluation of visualization usage. We demonstrate the benefits of our approach in a detailed case study, comparing task descriptions from our typology to those derived from related work. We also discuss the similarities and differences between our typology and over two dozen extant classification systems and theoretical frameworks from the literatures of visualization, human-computer interaction, information retrieval, communications, and cartography.", "abstracts": [ { "abstractType": "Regular", "content": "The considerable previous work characterizing visualization usage has focused on low-level tasks or interactions and high-level tasks, leaving a gap between them that is not addressed. This gap leads to a lack of distinction between the ends and means of a task, limiting the potential for rigorous analysis. We contribute a multi-level typology of visualization tasks to address this gap, distinguishing why and how a visualization task is performed, as well as what the task inputs and outputs are. Our typology allows complex tasks to be expressed as sequences of interdependent simpler tasks, resulting in concise and flexible descriptions for tasks of varying complexity and scope. It provides abstract rather than domain-specific descriptions of tasks, so that useful comparisons can be made between visualization systems targeted at different application domains. This descriptive power supports a level of analysis required for the generation of new designs, by guiding the translation of domain-specific problems into abstract tasks, and for the qualitative evaluation of visualization usage. We demonstrate the benefits of our approach in a detailed case study, comparing task descriptions from our typology to those derived from related work. We also discuss the similarities and differences between our typology and over two dozen extant classification systems and theoretical frameworks from the literatures of visualization, human-computer interaction, information retrieval, communications, and cartography.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The considerable previous work characterizing visualization usage has focused on low-level tasks or interactions and high-level tasks, leaving a gap between them that is not addressed. This gap leads to a lack of distinction between the ends and means of a task, limiting the potential for rigorous analysis. We contribute a multi-level typology of visualization tasks to address this gap, distinguishing why and how a visualization task is performed, as well as what the task inputs and outputs are. Our typology allows complex tasks to be expressed as sequences of interdependent simpler tasks, resulting in concise and flexible descriptions for tasks of varying complexity and scope. It provides abstract rather than domain-specific descriptions of tasks, so that useful comparisons can be made between visualization systems targeted at different application domains. This descriptive power supports a level of analysis required for the generation of new designs, by guiding the translation of domain-specific problems into abstract tasks, and for the qualitative evaluation of visualization usage. We demonstrate the benefits of our approach in a detailed case study, comparing task descriptions from our typology to those derived from related work. We also discuss the similarities and differences between our typology and over two dozen extant classification systems and theoretical frameworks from the literatures of visualization, human-computer interaction, information retrieval, communications, and cartography.", "title": "A Multi-Level Typology of Abstract Visualization Tasks", "normalizedTitle": "A Multi-Level Typology of Abstract Visualization Tasks", "fno": "ttg2013122376", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Topology", "Modeling", "Qualitative Evaluations", "Encoding", "Task And Requirements Analysis", "Topology", "Modeling", "Qualitative Evaluations", "Encoding", "Qualitative Evaluation", "Typology", "Visualization Models" ], "authors": [ { "givenName": "Matthew", "surname": "Brehmer", "fullName": "Matthew Brehmer", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Tamara", "surname": "Munzner", "fullName": "Tamara Munzner", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2013-12-01 00:00:00", "pubType": "trans", "pages": "2376-2385", "year": "2013", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iv/2013/5049/0/5049a351", "title": "A Typology for Data Visualization on the Web", "doi": null, "abstractUrl": "/proceedings-article/iv/2013/5049a351/12OmNAle6nG", "parentPublication": { "id": "proceedings/iv/2013/5049/0", "title": "2013 17th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a069", "title": "Comparing Information Visualization Tools Focusing on the Temporal Dimensions", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a069/12OmNrkBwv5", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000074", "title": "Focus Group Methodology for Evaluating Information Visualization Techniques and Tools", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000074/12OmNro0Icc", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a159", "title": "A Low Level Evaluation of Head-Tracker and Speech Commands Interactions in Information Visualization Tasks", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a159/12OmNscxj3B", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2011/0932/0/06065178", "title": "What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios", "doi": null, "abstractUrl": "/proceedings-article/scam/2011/06065178/12OmNyQ7G65", "parentPublication": { "id": "proceedings/scam/2011/0932/0", "title": "2011 IEEE 11th International Working Conference on Source Code Analysis and Manipulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2017/05/mcg2017050018", "title": "Typology of Uncertainty in Static Geolocated Graphs for Visualization", "doi": null, "abstractUrl": "/magazine/cg/2017/05/mcg2017050018/13rRUIJuxxZ", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019880", "title": "Beyond Tasks: An Activity Typology for Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019880/13rRUwdrdSD", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122366", "title": "A Design Space of Visualization Tasks", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122366/13rRUyuegh8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/beliv/2022/9629/0/962900a066", "title": "A Data-Centric Methodology and Task Typology for Time-Stamped Event Sequences", "doi": null, "abstractUrl": "/proceedings-article/beliv/2022/962900a066/1J6hQC7MN6o", "parentPublication": { "id": "proceedings/beliv/2022/9629/0", "title": "2022 IEEE Evaluation and Beyond - Methodological Approaches for Visualization (BELIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/10/09371413", "title": "A State-of-the-Art Survey of Tasks for Tree Design and Evaluation With a Curated Task Dataset", "doi": null, "abstractUrl": "/journal/tg/2022/10/09371413/1rIQFFoJXEI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2013122366", "articleId": "13rRUyuegh8", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2013122386", "articleId": "13rRUygT7mY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1I05Bw9xb6o", "doi": "10.1109/TVCG.2022.3219248", "abstract": "In recent years, visual analytics (VA) has shown promise in alleviating the challenges of interpreting black-box deep learning (DL) models. While the focus of VA for explainable DL has been mainly on classification problems, DL is gaining popularity in high-dimensional-to-high-dimensional (<italic>H-H</italic>) problems such as image-to-image translation. In contrast to classification, <italic>H-H</italic> problems have no explicit instance groups or classes to study. Each output is continuous, high-dimensional, and changes in an unknown non-linear manner with changes in the input. These unknown relations between the input, model and output necessitate the user to analyze them in conjunction, leveraging symmetries between them. Since classification tasks do not exhibit some of these challenges, most existing VA systems and frameworks allow limited control of the components required to analyze models beyond classification. Hence, we identify the need for and present a unified conceptual framework, the <italic>Transform-and-Perform</italic> framework (<italic>T&amp;P</italic>), to facilitate the design of VA systems for DL model analysis focusing on <italic>H-H</italic> problems. <italic>T&amp;P</italic> provides a checklist to structure and identify workflows and analysis strategies to design new VA systems, and understand existing ones to uncover potential gaps for improvements. The goal is to aid the creation of effective VA systems that support the structuring of model understanding and identifying actionable insights for model improvements. We highlight the growing need for new frameworks like <italic>T&amp;P</italic> with a real-world image-to-image translation application. We illustrate how <italic>T&amp;P</italic> effectively supports the understanding and identification of potential gaps in existing VA systems.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years, visual analytics (VA) has shown promise in alleviating the challenges of interpreting black-box deep learning (DL) models. While the focus of VA for explainable DL has been mainly on classification problems, DL is gaining popularity in high-dimensional-to-high-dimensional (<italic>H-H</italic>) problems such as image-to-image translation. In contrast to classification, <italic>H-H</italic> problems have no explicit instance groups or classes to study. Each output is continuous, high-dimensional, and changes in an unknown non-linear manner with changes in the input. These unknown relations between the input, model and output necessitate the user to analyze them in conjunction, leveraging symmetries between them. Since classification tasks do not exhibit some of these challenges, most existing VA systems and frameworks allow limited control of the components required to analyze models beyond classification. Hence, we identify the need for and present a unified conceptual framework, the <italic>Transform-and-Perform</italic> framework (<italic>T&amp;P</italic>), to facilitate the design of VA systems for DL model analysis focusing on <italic>H-H</italic> problems. <italic>T&amp;P</italic> provides a checklist to structure and identify workflows and analysis strategies to design new VA systems, and understand existing ones to uncover potential gaps for improvements. The goal is to aid the creation of effective VA systems that support the structuring of model understanding and identifying actionable insights for model improvements. We highlight the growing need for new frameworks like <italic>T&amp;P</italic> with a real-world image-to-image translation application. We illustrate how <italic>T&amp;P</italic> effectively supports the understanding and identification of potential gaps in existing VA systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years, visual analytics (VA) has shown promise in alleviating the challenges of interpreting black-box deep learning (DL) models. While the focus of VA for explainable DL has been mainly on classification problems, DL is gaining popularity in high-dimensional-to-high-dimensional (H-H) problems such as image-to-image translation. In contrast to classification, H-H problems have no explicit instance groups or classes to study. Each output is continuous, high-dimensional, and changes in an unknown non-linear manner with changes in the input. These unknown relations between the input, model and output necessitate the user to analyze them in conjunction, leveraging symmetries between them. Since classification tasks do not exhibit some of these challenges, most existing VA systems and frameworks allow limited control of the components required to analyze models beyond classification. Hence, we identify the need for and present a unified conceptual framework, the Transform-and-Perform framework (T&P), to facilitate the design of VA systems for DL model analysis focusing on H-H problems. T&P provides a checklist to structure and identify workflows and analysis strategies to design new VA systems, and understand existing ones to uncover potential gaps for improvements. The goal is to aid the creation of effective VA systems that support the structuring of model understanding and identifying actionable insights for model improvements. We highlight the growing need for new frameworks like T&P with a real-world image-to-image translation application. We illustrate how T&P effectively supports the understanding and identification of potential gaps in existing VA systems.", "title": "The <italic>Transform-and-Perform</italic> framework: Explainable deep learning beyond classification", "normalizedTitle": "The Transform-and-Perform framework: Explainable deep learning beyond classification", "fno": "09937145", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Analytical Models", "Behavioral Sciences", "Complexity Theory", "Computational Modeling", "Task Analysis", "Context Modeling", "Brain Modeling", "Visual Analytics", "Explainable AI", "XAI", "Framework", "Deep Learning", "High Dimensional To High Dimensional Translation" ], "authors": [ { "givenName": "Vidya", "surname": "Prasad", "fullName": "Vidya Prasad", "affiliation": "Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands", "__typename": "ArticleAuthorType" }, { "givenName": "Ruud J. G.", "surname": "van Sloun", "fullName": "Ruud J. G. van Sloun", "affiliation": "Department of Electrical Engineering, Eindhoven University of Technology, Eindhoven, The Netherlands", "__typename": "ArticleAuthorType" }, { "givenName": "Stef van den", "surname": "Elzen", "fullName": "Stef van den Elzen", "affiliation": "Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands", "__typename": "ArticleAuthorType" }, { "givenName": "Anna", "surname": "Vilanova", "fullName": "Anna Vilanova", "affiliation": "Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands", "__typename": "ArticleAuthorType" }, { "givenName": "Nicola", "surname": "Pezzotti", "fullName": "Nicola Pezzotti", "affiliation": "Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/ts/2019/02/08114267", "title": "Automated Refactoring of OCL Constraints with Search", "doi": null, "abstractUrl": "/journal/ts/2019/02/08114267/17D45VsBU6k", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09878222", "title": "Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors", "doi": null, "abstractUrl": "/journal/tq/5555/01/09878222/1GrP91HemEo", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09928211", "title": "FewM-HGCL&#x00A0;:&#x00A0;Few-Shot Malware Variants Detection Via Heterogeneous Graph Contrastive Learning", "doi": null, "abstractUrl": "/journal/tq/5555/01/09928211/1HJuUzzFey4", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipccc/2022/8018/0/09894322", "title": "Exploring Adversarial Attacks on Neural Networks: An Explainable Approach", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2022/09894322/1HpCusekVfW", "parentPublication": { "id": "proceedings/ipccc/2022/8018/0", "title": "2022 IEEE International Performance, Computing, and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09937064", "title": "Visual Exploration of Machine Learning Model Behavior with Hierarchical Surrogate Rule Sets", "doi": null, "abstractUrl": "/journal/tg/5555/01/09937064/1I05Bh36uZy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2023/04/09961906", "title": "To Follow or Not to Follow: Understanding <italic>Issue/Pull-Request Templates</italic> on GitHub", "doi": null, "abstractUrl": "/journal/ts/2023/04/09961906/1Ixw0ySXhTy", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/5555/01/10113794", "title": "Efficient and Robust KPI Outlier Detection for Large-Scale Datacenters", "doi": null, "abstractUrl": "/journal/tc/5555/01/10113794/1MNbTs1XcIM", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/02/09207859", "title": "Linear Time Reconciliation With Bounded Transfers of Genes", "doi": null, "abstractUrl": "/journal/tb/2022/02/09207859/1nuwhaK3I2c", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/12/09384328", "title": "Learning Rates for Stochastic Gradient Descent With Nonconvex Objectives", "doi": null, "abstractUrl": "/journal/tp/2021/12/09384328/1scDnUQn6JW", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552241", "title": "<italic>COVID</italic>-view: Diagnosis of COVID-19 using Chest CT", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552241/1xic6RdmNC8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09937064", "articleId": "1I05Bh36uZy", "__typename": "AdjacentArticleType" }, "next": { "fno": "09938388", "articleId": "1I05BGZpHZ6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNAPjA9W", "title": "May-June", "year": "2016", "issueNum": "03", "idPrefix": "cg", "pubType": "magazine", "volume": "36", "label": "May-June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyekIZN", "doi": "10.1109/MCG.2015.25", "abstract": "Organizing sports video data for performance analysis can be challenging, especially in cases involving multiple attributes and when the criteria for sorting frequently changes depending on the user's task. The proposed visual analytic system enables users to specify a sort requirement in a flexible manner without depending on specific knowledge about individual sort keys. The authors use regression techniques to train different analytical models for different types of sorting requirements and use visualization to facilitate knowledge discovery at different stages of the process. They demonstrate the system with a rugby case study to find key instances for analyzing team and player performance. Organizing sports video data for performance analysis can be challenging in cases with multiple attributes, and when sorting frequently changes depending on the user's task. As this video shows, the proposed visual analytic system allows interactive data sorting and exploration. https://youtu.be/Cs6SLtPVDQQ.", "abstracts": [ { "abstractType": "Regular", "content": "Organizing sports video data for performance analysis can be challenging, especially in cases involving multiple attributes and when the criteria for sorting frequently changes depending on the user's task. The proposed visual analytic system enables users to specify a sort requirement in a flexible manner without depending on specific knowledge about individual sort keys. The authors use regression techniques to train different analytical models for different types of sorting requirements and use visualization to facilitate knowledge discovery at different stages of the process. They demonstrate the system with a rugby case study to find key instances for analyzing team and player performance. Organizing sports video data for performance analysis can be challenging in cases with multiple attributes, and when sorting frequently changes depending on the user's task. As this video shows, the proposed visual analytic system allows interactive data sorting and exploration. https://youtu.be/Cs6SLtPVDQQ.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Organizing sports video data for performance analysis can be challenging, especially in cases involving multiple attributes and when the criteria for sorting frequently changes depending on the user's task. The proposed visual analytic system enables users to specify a sort requirement in a flexible manner without depending on specific knowledge about individual sort keys. The authors use regression techniques to train different analytical models for different types of sorting requirements and use visualization to facilitate knowledge discovery at different stages of the process. They demonstrate the system with a rugby case study to find key instances for analyzing team and player performance. Organizing sports video data for performance analysis can be challenging in cases with multiple attributes, and when sorting frequently changes depending on the user's task. As this video shows, the proposed visual analytic system allows interactive data sorting and exploration. https://youtu.be/Cs6SLtPVDQQ.", "title": "Knowledge-Assisted Ranking: A Visual Analytic Application for Sports Event Data", "normalizedTitle": "Knowledge-Assisted Ranking: A Visual Analytic Application for Sports Event Data", "fno": "mcg2016030072", "hasPdf": true, "idPrefix": "cg", "keywords": [ "Sorting", "Analytical Models", "Visual Analytics", "Predictive Models", "Data Models", "Knowledge Discovery", "Game Theory", "Visualization", "Computer Graphics", "Sports Video Data", "Visual Analytic System", "Regression Techniques" ], "authors": [ { "givenName": "David H.S.", "surname": "Chung", "fullName": "David H.S. Chung", "affiliation": "Swansea University", "__typename": "ArticleAuthorType" }, { "givenName": "Matthew L.", "surname": "Parry", "fullName": "Matthew L. Parry", "affiliation": "Swansea University", "__typename": "ArticleAuthorType" }, { "givenName": "Iwan W.", "surname": "Griffiths", "fullName": "Iwan W. Griffiths", "affiliation": "Swansea University", "__typename": "ArticleAuthorType" }, { "givenName": "Robert S.", "surname": "Laramee", "fullName": "Robert S. Laramee", "affiliation": "Swansea University", "__typename": "ArticleAuthorType" }, { "givenName": "Rhodri", "surname": "Bown", "fullName": "Rhodri Bown", "affiliation": "Welsh Rugby Union", "__typename": "ArticleAuthorType" }, { "givenName": "Philip A.", "surname": "Legg", "fullName": "Philip A. Legg", "affiliation": "University of the West of England", "__typename": "ArticleAuthorType" }, { "givenName": "Min", "surname": "Chen", "fullName": "Min Chen", "affiliation": "University of Oxford", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2016-05-01 00:00:00", "pubType": "mags", "pages": "72-82", "year": "2016", "issn": "0272-1716", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/asap/2000/0716/0/07160299", "title": "Tradeoff Analysis and Architecture Design of a Hybrid Hardware/Software Sorter", "doi": null, "abstractUrl": "/proceedings-article/asap/2000/07160299/12OmNwCaCw1", "parentPublication": { "id": "proceedings/asap/2000/0716/0", "title": "Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icrtccm/2017/4799/0/4799a182", "title": "Event Recognition and Classification in Sports Video", "doi": null, "abstractUrl": "/proceedings-article/icrtccm/2017/4799a182/12OmNwpoFDV", "parentPublication": { "id": "proceedings/icrtccm/2017/4799/0", "title": "2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2016/3578/0/07733824", "title": "Urban Sports Level Evaluation Based on Improved Fuzzy Analytic Hierarchy Process", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2016/07733824/12OmNyNQSDz", "parentPublication": { "id": "proceedings/icsgea/2016/3578/0", "title": "2016 International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sasow/2011/4545/0/4545a073", "title": "Spatial Sorting Algorithms for Parallel Computing in Networks", "doi": null, "abstractUrl": "/proceedings-article/sasow/2011/4545a073/12OmNyVerZu", "parentPublication": { "id": "proceedings/sasow/2011/4545/0", "title": "Self-Adaptive and Self-Organizing Systems Workshops, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispan/1996/7460/0/74600015", "title": "Efficient in-place sorting algorithms using feasible parallel machine models", "doi": null, "abstractUrl": "/proceedings-article/ispan/1996/74600015/12OmNzahcdD", "parentPublication": { "id": "proceedings/ispan/1996/7460/0", "title": "Parallel Architectures, Algorithms, and Networks, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1989/02/t0238", "title": "Parallel Sorting in Two-Dimensional VLSI Models of Computation", "doi": null, "abstractUrl": "/journal/tc/1989/02/t0238/13rRUwhpBD9", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2005/03/v0285", "title": "Hardware-Assisted Visibility Sorting for Unstructured Volume Rendering", "doi": null, "abstractUrl": "/journal/tg/2005/03/v0285/13rRUxOdD89", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09906966", "title": "RASIPAM: Interactive Pattern Mining of Multivariate Event Sequences in Racket Sports", "doi": null, "abstractUrl": "/journal/tg/2023/01/09906966/1H5ERCYJa48", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iotdi/2020/6602/0/660200a066", "title": "Recovery-Conscious Adaptive Watermark Generation for Time-Order Event Stream Processing", "doi": null, "abstractUrl": "/proceedings-article/iotdi/2020/660200a066/1k0P5Oh3F3G", "parentPublication": { "id": "proceedings/iotdi/2020/6602/0", "title": "2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2020/8009/0/800900a036", "title": "Visual Analytics of Multivariate Event Sequence Data in Racquet Sports", "doi": null, "abstractUrl": "/proceedings-article/vast/2020/800900a036/1q7jwkJx00U", "parentPublication": { "id": "proceedings/vast/2020/8009/0", "title": "2020 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mcg2016030060", "articleId": "13rRUxASu3j", "__typename": "AdjacentArticleType" }, "next": { "fno": "mcg2016030083", "articleId": "13rRUygT7hC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXWRIE", "name": "mcg2016030072s1.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/mcg2016030072s1.mp4", "extension": "mp4", "size": "33.5 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nJsHwdIuqc", "doi": "10.1109/TVCG.2020.3028958", "abstract": "Graph mining plays a pivotal role across a number of disciplines, and a variety of algorithms have been developed to answer who/what type questions. For example, what items shall we recommend to a given user on an e-commerce platform? The answers to such questions are typically returned in the form of a ranked list, and graph-based ranking methods are widely used in industrial information retrieval settings. However, these ranking algorithms have a variety of sensitivities, and even small changes in rank can lead to vast reductions in product sales and page hits. As such, there is a need for tools and methods that can help model developers and analysts explore the sensitivities of graph ranking algorithms with respect to perturbations within the graph structure. In this paper, we present a visual analytics framework for explaining and exploring the sensitivity of any graph-based ranking algorithm by performing perturbation-based what-if analysis. We demonstrate our framework through three case studies inspecting the sensitivity of two classic graph-based ranking algorithms (PageRank and HITS) as applied to rankings in political news media and social networks.", "abstracts": [ { "abstractType": "Regular", "content": "Graph mining plays a pivotal role across a number of disciplines, and a variety of algorithms have been developed to answer who/what type questions. For example, what items shall we recommend to a given user on an e-commerce platform? The answers to such questions are typically returned in the form of a ranked list, and graph-based ranking methods are widely used in industrial information retrieval settings. However, these ranking algorithms have a variety of sensitivities, and even small changes in rank can lead to vast reductions in product sales and page hits. As such, there is a need for tools and methods that can help model developers and analysts explore the sensitivities of graph ranking algorithms with respect to perturbations within the graph structure. In this paper, we present a visual analytics framework for explaining and exploring the sensitivity of any graph-based ranking algorithm by performing perturbation-based what-if analysis. We demonstrate our framework through three case studies inspecting the sensitivity of two classic graph-based ranking algorithms (PageRank and HITS) as applied to rankings in political news media and social networks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph mining plays a pivotal role across a number of disciplines, and a variety of algorithms have been developed to answer who/what type questions. For example, what items shall we recommend to a given user on an e-commerce platform? The answers to such questions are typically returned in the form of a ranked list, and graph-based ranking methods are widely used in industrial information retrieval settings. However, these ranking algorithms have a variety of sensitivities, and even small changes in rank can lead to vast reductions in product sales and page hits. As such, there is a need for tools and methods that can help model developers and analysts explore the sensitivities of graph ranking algorithms with respect to perturbations within the graph structure. In this paper, we present a visual analytics framework for explaining and exploring the sensitivity of any graph-based ranking algorithm by performing perturbation-based what-if analysis. We demonstrate our framework through three case studies inspecting the sensitivity of two classic graph-based ranking algorithms (PageRank and HITS) as applied to rankings in political news media and social networks.", "title": "Auditing the Sensitivity of Graph-based Ranking with Visual Analytics", "normalizedTitle": "Auditing the Sensitivity of Graph-based Ranking with Visual Analytics", "fno": "09216512", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Mining", "Data Visualisation", "Graph Theory", "Information Retrieval", "Search Engines", "Model Developers", "Graph Structure", "Visual Analytics Framework", "Graph Mining", "E Commerce Platform", "Ranked List", "Graph Based Ranking Methods", "Industrial Information Retrieval Settings", "Perturbation Based What If Analysis", "Sensitivity", "Perturbation Methods", "Blogs", "Visual Analytics", "Task Analysis", "Layout", "Hypertext Systems", "Graph Based Ranking", "Sensitivity Analysis", "Visual Analytics" ], "authors": [ { "givenName": "Tiankai", "surname": "Xie", "fullName": "Tiankai Xie", "affiliation": "Arizona State University", "__typename": "ArticleAuthorType" }, { "givenName": "Yuxin", "surname": "Ma", "fullName": "Yuxin Ma", "affiliation": "Arizona State University", "__typename": "ArticleAuthorType" }, { "givenName": "Hanghang", "surname": "Tong", "fullName": "Hanghang Tong", "affiliation": "University of Illinois at Urbana-Champaign", "__typename": "ArticleAuthorType" }, { "givenName": "My T.", "surname": "Thai", "fullName": "My T. Thai", "affiliation": "University of Florida", "__typename": "ArticleAuthorType" }, { "givenName": "Ross", "surname": "Maciejewski", "fullName": "Ross Maciejewski", "affiliation": "Arizona State University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "1459-1469", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ictai/2014/6572/0/6572a493", "title": "Tri-Rank: An Authority Ranking Framework in Heterogeneous Academic Networks by Mutual Reinforce", "doi": null, "abstractUrl": "/proceedings-article/ictai/2014/6572a493/12OmNAS9zG1", "parentPublication": { "id": "proceedings/ictai/2014/6572/0", "title": "2014 IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2006/2702/0/04063603", "title": "Concept-Aware Ranking: Teaching an Old Graph New Moves", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2006/04063603/12OmNBAqZFL", "parentPublication": { "id": "proceedings/icdmw/2006/2702/0", "title": "Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2008/3496/3/3496c677", "title": "Ranking Web Pages Using Machine Learning Approaches", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2008/3496c677/12OmNBU1jT0", "parentPublication": { "id": "proceedings/wi-iat/2008/3496/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391b071", "title": "Attribute-Graph: A Graph Based Approach to Image Ranking", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391b071/12OmNCxtyO4", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2015/9808/0/9808a268", "title": "Ranking Scientific Articles over Heterogeneous Academic Network", "doi": null, "abstractUrl": "/proceedings-article/skg/2015/9808a268/12OmNxbW4Op", "parentPublication": { "id": "proceedings/skg/2015/9808/0", "title": "2015 11th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2005/2331/0/23310533", "title": "Using a Layered Markov Model for Distributed Web Ranking Computation", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2005/23310533/12OmNyXMQef", "parentPublication": { "id": "proceedings/icdcs/2005/2331/0", "title": "25th IEEE International Conference on Distributed Computing Systems (ICDCS'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019863", "title": "Podium: Ranking Data Using Mixed-Initiative Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019863/13rRUwwaKtd", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2022/2335/0/233500a196", "title": "Visual Analytics of Multiple Network Ranking Based on Structural Similarity", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2022/233500a196/1E2wmSIym52", "parentPublication": { "id": "proceedings/pacificvis/2022/2335/0", "title": "2022 IEEE 15th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/10/08968368", "title": "Graph Ranking Auditing: Problem Definition and Fast Solutions", "doi": null, "abstractUrl": "/journal/tk/2021/10/08968368/1gQYsQTgU6Y", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2017/4993/0/09069156", "title": "Edge-weighting Hyperlink-Induced Topic Search (E-HITS) Algorithm", "doi": null, "abstractUrl": "/proceedings-article/asonam/2017/09069156/1j9xRA0BM8U", "parentPublication": { "id": "proceedings/asonam/2017/4993/0", "title": "2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09216629", "articleId": "1nJsGFc8lUY", "__typename": "AdjacentArticleType" }, "next": { "fno": "09222272", "articleId": "1nTrx9KWtbO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qLfs2yl0Ck", "name": "ttg202102-09216512s1-supp1-3028958.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09216512s1-supp1-3028958.mp4", "extension": "mp4", "size": "108 MB", "__typename": "WebExtraType" }, { "id": "1qLfpzdxAdy", "name": "ttg202102-09216512s1-supp2-3028958.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09216512s1-supp2-3028958.mp4", "extension": "mp4", "size": "42.5 MB", "__typename": "WebExtraType" }, { "id": "1qLfrnNtQI0", "name": "ttg202102-09216512s1-supp3-3028958.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09216512s1-supp3-3028958.pdf", "extension": "pdf", "size": "38.9 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNCaLEju", "title": "Jan.", "year": "2018", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "24", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUNvgz9X", "doi": "10.1109/TVCG.2017.2744684", "abstract": "Interactive visual data analysis is most productive when users can focus on answering the questions they have about their data, rather than focusing on how to operate the interface to the analysis tool. One viable approach to engaging users in interactive conversations with their data is a natural language interface to visualizations. These interfaces have the potential to be both more expressive and more accessible than other interaction paradigms. We explore how principles from language pragmatics can be applied to the flow of visual analytical conversations, using natural language as an input modality. We evaluate the effectiveness of pragmatics support in our system Evizeon, and present design considerations for conversation interfaces to visual analytics tools.", "abstracts": [ { "abstractType": "Regular", "content": "Interactive visual data analysis is most productive when users can focus on answering the questions they have about their data, rather than focusing on how to operate the interface to the analysis tool. One viable approach to engaging users in interactive conversations with their data is a natural language interface to visualizations. These interfaces have the potential to be both more expressive and more accessible than other interaction paradigms. We explore how principles from language pragmatics can be applied to the flow of visual analytical conversations, using natural language as an input modality. We evaluate the effectiveness of pragmatics support in our system Evizeon, and present design considerations for conversation interfaces to visual analytics tools.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Interactive visual data analysis is most productive when users can focus on answering the questions they have about their data, rather than focusing on how to operate the interface to the analysis tool. One viable approach to engaging users in interactive conversations with their data is a natural language interface to visualizations. These interfaces have the potential to be both more expressive and more accessible than other interaction paradigms. We explore how principles from language pragmatics can be applied to the flow of visual analytical conversations, using natural language as an input modality. We evaluate the effectiveness of pragmatics support in our system Evizeon, and present design considerations for conversation interfaces to visual analytics tools.", "title": "Applying Pragmatics Principles for Interaction with Visual Analytics", "normalizedTitle": "Applying Pragmatics Principles for Interaction with Visual Analytics", "fno": "08019833", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Pragmatics", "Visual Analytics", "Natural Languages", "Data Visualization", "Coherence", "Tools", "Natural Language", "Interaction", "Language Pragmatics", "Visual Analytics", "Ambiguity", "Feedback" ], "authors": [ { "givenName": "Enamul", "surname": "Hoque", "fullName": "Enamul Hoque", "affiliation": "Stanford University", "__typename": "ArticleAuthorType" }, { "givenName": "Vidya", "surname": "Setlur", "fullName": "Vidya Setlur", "affiliation": "Tableau Research", "__typename": "ArticleAuthorType" }, { "givenName": "Melanie", "surname": "Tory", "fullName": "Melanie Tory", "affiliation": "Tableau Research", "__typename": "ArticleAuthorType" }, { "givenName": "Isaac", "surname": "Dykeman", "fullName": "Isaac Dykeman", "affiliation": "Rice University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "01", "pubDate": "2018-01-01 00:00:00", "pubType": "trans", "pages": "309-318", "year": "2018", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2013/4892/0/4892b495", "title": "A Role for Reasoning in Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892b495/12OmNqJ8tq4", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2008/3441/0/3441a058", "title": "Classic Chinese Automatic Question Answering System Based on Pragmatics Information", "doi": null, "abstractUrl": "/proceedings-article/micai/2008/3441a058/12OmNwGIcCa", "parentPublication": { "id": "proceedings/micai/2008/3441/0", "title": "2008 Seventh Mexican International Conference on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042548", "title": "Integrated visual analytics tool for heterogeneous text data", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042548/12OmNxFJXsT", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718615", "title": "Expanding the Scope: Interaction Design Perspectives for Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718615/12OmNxGSm6x", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percomw/2016/1941/0/07457127", "title": "Integrating quality of information with pragmatic assistance", "doi": null, "abstractUrl": "/proceedings-article/percomw/2016/07457127/12OmNxecS2l", "parentPublication": { "id": "proceedings/percomw/2016/1941/0", "title": "2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042508", "title": "Emoticons and linguistic alignment: How visual analytics can elicit storytelling", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042508/12OmNxzMnLL", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a006", "title": "Facilitating Conversational Interaction in Natural Language Interfaces for Visualization", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a006/1J6hcTVtKNy", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2019/2239/0/223900a079", "title": "Pragmatic Characteristics of Security Conversations: An Exploratory Linguistic Analysis", "doi": null, "abstractUrl": "/proceedings-article/chase/2019/223900a079/1cTIDQJkWaY", "parentPublication": { "id": "proceedings/chase/2019/2239/0", "title": "2019 IEEE/ACM 12th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a360", "title": "Comparison of Full-text Articles and Abstracts for Visual Trend Analytics through Natural Language Processing", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a360/1rSRdbyf9bG", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a151", "title": "ConVIScope: Visual Analytics for Exploring Patient Conversations", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a151/1yXul7EUtuE", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08019851", "articleId": "13rRUxBrGh7", "__typename": "AdjacentArticleType" }, "next": { "fno": "08017652", "articleId": "13rRUwgQpDy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXWREZ", "name": "ttg201801-08019833s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201801-08019833s1.zip", "extension": "zip", "size": "11 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwpGgK8", "title": "Dec.", "year": "2014", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "20", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwwJWFN", "doi": "10.1109/TVCG.2014.2346573", "abstract": "When people work together to analyze a data set, they need to organize their findings, hypotheses, and evidence, share that information with their collaborators, and coordinate activities amongst team members. Sharing externalizations (recorded information such as notes) could increase awareness and assist with team communication and coordination. However, we currently know little about how to provide tool support for this sort of sharing. We explore how linked common work (LCW) can be employed within a ‘collaborative thinking space’, to facilitate synchronous collaborative sensemaking activities in Visual Analytics (VA). Collaborative thinking spaces provide an environment for analysts to record, organize, share and connect externalizations. Our tool, CLIP, extends earlier thinking spaces by integrating LCW features that reveal relationships between collaborators' findings. We conducted a user study comparing CLIP to a baseline version without LCW. Results demonstrated that LCW significantly improved analytic outcomes at a collaborative intelligence task. Groups using CLIP were also able to more effectively coordinate their work, and held more discussion of their findings and hypotheses. LCW enabled them to maintain awareness of each other's activities and findings and link those findings to their own work, preventing disruptive oral awareness notifications.", "abstracts": [ { "abstractType": "Regular", "content": "When people work together to analyze a data set, they need to organize their findings, hypotheses, and evidence, share that information with their collaborators, and coordinate activities amongst team members. Sharing externalizations (recorded information such as notes) could increase awareness and assist with team communication and coordination. However, we currently know little about how to provide tool support for this sort of sharing. We explore how linked common work (LCW) can be employed within a ‘collaborative thinking space’, to facilitate synchronous collaborative sensemaking activities in Visual Analytics (VA). Collaborative thinking spaces provide an environment for analysts to record, organize, share and connect externalizations. Our tool, CLIP, extends earlier thinking spaces by integrating LCW features that reveal relationships between collaborators' findings. We conducted a user study comparing CLIP to a baseline version without LCW. Results demonstrated that LCW significantly improved analytic outcomes at a collaborative intelligence task. Groups using CLIP were also able to more effectively coordinate their work, and held more discussion of their findings and hypotheses. LCW enabled them to maintain awareness of each other's activities and findings and link those findings to their own work, preventing disruptive oral awareness notifications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "When people work together to analyze a data set, they need to organize their findings, hypotheses, and evidence, share that information with their collaborators, and coordinate activities amongst team members. Sharing externalizations (recorded information such as notes) could increase awareness and assist with team communication and coordination. However, we currently know little about how to provide tool support for this sort of sharing. We explore how linked common work (LCW) can be employed within a ‘collaborative thinking space’, to facilitate synchronous collaborative sensemaking activities in Visual Analytics (VA). Collaborative thinking spaces provide an environment for analysts to record, organize, share and connect externalizations. Our tool, CLIP, extends earlier thinking spaces by integrating LCW features that reveal relationships between collaborators' findings. We conducted a user study comparing CLIP to a baseline version without LCW. Results demonstrated that LCW significantly improved analytic outcomes at a collaborative intelligence task. Groups using CLIP were also able to more effectively coordinate their work, and held more discussion of their findings and hypotheses. LCW enabled them to maintain awareness of each other's activities and findings and link those findings to their own work, preventing disruptive oral awareness notifications.", "title": "Supporting Communication and Coordination in Collaborative Sensemaking", "normalizedTitle": "Supporting Communication and Coordination in Collaborative Sensemaking", "fno": "06875986", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Rendering Computer Graphics", "Measurement", "Image Resolution", "Quality Assessment", "Data Visualization", "Video Recording", "Optimization", "Collaborative Thinking Space", "Sensemaking", "Collaboration", "Externalization", "Linked Common Work" ], "authors": [ { "givenName": "Narges", "surname": "Mahyar", "fullName": "Narges Mahyar", "affiliation": ", University of Victoria", "__typename": "ArticleAuthorType" }, { "givenName": "Melanie", "surname": "Tory", "fullName": "Melanie Tory", "affiliation": ", University of Victoria", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2014-12-01 00:00:00", "pubType": "trans", "pages": "1633-1642", "year": "2014", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cnsm/2017/98/0/08256001", "title": "Distributed-collaborative managed dash video services", "doi": null, "abstractUrl": "/proceedings-article/cnsm/2017/08256001/12OmNAWpyqy", "parentPublication": { "id": "proceedings/cnsm/2017/98/0", "title": "2017 13th International Conference on Network and Service Management (CNSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2014/4277/0/06912646", "title": "Selective encryption of video transmissions over multi-hop wireless networks", "doi": null, "abstractUrl": "/proceedings-article/iscc/2014/06912646/12OmNBAIAQY", "parentPublication": { "id": "proceedings/iscc/2014/4277/0", "title": "2014 IEEE Symposium on Computers and Communication (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2009/3711/0/3711a215", "title": "Collaborative Learning by Means of Video Games: An Entertainment System in the Learning Processes", "doi": null, "abstractUrl": "/proceedings-article/icalt/2009/3711a215/12OmNrMHOcy", "parentPublication": { "id": "proceedings/icalt/2009/3711/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/platcon/2015/1888/0/1888a001", "title": "New Method for Spatial Scalable Video Quality Evaluation", "doi": null, "abstractUrl": "/proceedings-article/platcon/2015/1888a001/12OmNvxbhNR", "parentPublication": { "id": "proceedings/platcon/2015/1888/0", "title": "2015 International Conference on Platform Technology and Service (PlatCon)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dcve/2014/5217/0/07160928", "title": "A survey of communication and awareness in collaborative virtual environments", "doi": null, "abstractUrl": "/proceedings-article/3dcve/2014/07160928/12OmNxGj9Sa", "parentPublication": { "id": "proceedings/3dcve/2014/5217/0", "title": "2014 International Workshop on Collaborative Virtual Environments (3DCVE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cscwd/2005/0002/2/01504229", "title": "Supporting collaborative learning in engineering design", "doi": null, "abstractUrl": "/proceedings-article/cscwd/2005/01504229/12OmNxI0Kv2", "parentPublication": { "id": "proceedings/cscwd/2005/0002/2", "title": "International Conference on Computer Supported Cooperative Work in Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2004/8552/0/01408638", "title": "From peer assessment towards collaborative learning", "doi": null, "abstractUrl": "/proceedings-article/fie/2004/01408638/12OmNyS6Rzh", "parentPublication": { "id": "proceedings/fie/2004/8552/0", "title": "34th Annual Frontiers in Education, 2004. FIE 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875936", "title": "Interactive Progressive Visualization with Space-Time Error Control", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875936/13rRUxZRbo1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017596", "title": "Supporting Handoff in Asynchronous Collaborative Sensemaking Using Knowledge-Transfer Graphs", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017596/13rRUytWF9s", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2020/6090/0/09155763", "title": "Enhancing Critical Thinking Skills of Elementary School Students through Collaborative Learning", "doi": null, "abstractUrl": "/proceedings-article/icalt/2020/09155763/1m1j5o85M8U", "parentPublication": { "id": "proceedings/icalt/2020/6090/0", "title": "2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06875999", "articleId": "13rRUyuNswZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "06875995", "articleId": "13rRUwI5Ugb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzA6GUo", "title": "Sept.-Oct.", "year": "2015", "issueNum": "05", "idPrefix": "tq", "pubType": "journal", "volume": "12", "label": "Sept.-Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUNvyaau", "doi": "10.1109/TDSC.2014.2369034", "abstract": "Severe privacy leakage in the AOL search log incident has attracted considerable worldwide attention. However, all the web users’ daily search intents and behavior are collected in such data, which can be invaluable for researchers, data analysts and law enforcement personnel to conduct social behavior study [14], criminal investigation [5] and epidemics detection [10]. Thus, an important and challenging research problem is how to sanitize search logs with strong privacy guarantee and sufficiently retained utility. Existing approaches in search log sanitization are capable of only protecting the privacy under a rigorous standard [24] or maintaining good output utility [25] . To the best of our knowledge, there is little work that has perfectly resolved such tradeoff in the context of search logs, meeting a high standard of both requirements. In this paper, we propose a sanitization framework to tackle the above issue in a distributed manner. More specifically, our framework enables different parties to collaboratively generate search logs with boosted utility while satisfying Differential Privacy. In this scenario, two privacy-preserving objectives arise: first, the collaborative sanitization should satisfy differential privacy; second, the collaborative parties cannot learn any private information from each other. We present an efficient protocol –Collaborative sEarch Log Sanitization (CELS) to meet both privacy requirements. Besides security/privacy and cost analysis, we demonstrate the utility and efficiency of our approach with real data sets.", "abstracts": [ { "abstractType": "Regular", "content": "Severe privacy leakage in the AOL search log incident has attracted considerable worldwide attention. However, all the web users’ daily search intents and behavior are collected in such data, which can be invaluable for researchers, data analysts and law enforcement personnel to conduct social behavior study [14], criminal investigation [5] and epidemics detection [10]. Thus, an important and challenging research problem is how to sanitize search logs with strong privacy guarantee and sufficiently retained utility. Existing approaches in search log sanitization are capable of only protecting the privacy under a rigorous standard [24] or maintaining good output utility [25] . To the best of our knowledge, there is little work that has perfectly resolved such tradeoff in the context of search logs, meeting a high standard of both requirements. In this paper, we propose a sanitization framework to tackle the above issue in a distributed manner. More specifically, our framework enables different parties to collaboratively generate search logs with boosted utility while satisfying Differential Privacy. In this scenario, two privacy-preserving objectives arise: first, the collaborative sanitization should satisfy differential privacy; second, the collaborative parties cannot learn any private information from each other. We present an efficient protocol –Collaborative sEarch Log Sanitization (CELS) to meet both privacy requirements. Besides security/privacy and cost analysis, we demonstrate the utility and efficiency of our approach with real data sets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Severe privacy leakage in the AOL search log incident has attracted considerable worldwide attention. However, all the web users’ daily search intents and behavior are collected in such data, which can be invaluable for researchers, data analysts and law enforcement personnel to conduct social behavior study [14], criminal investigation [5] and epidemics detection [10]. Thus, an important and challenging research problem is how to sanitize search logs with strong privacy guarantee and sufficiently retained utility. Existing approaches in search log sanitization are capable of only protecting the privacy under a rigorous standard [24] or maintaining good output utility [25] . To the best of our knowledge, there is little work that has perfectly resolved such tradeoff in the context of search logs, meeting a high standard of both requirements. In this paper, we propose a sanitization framework to tackle the above issue in a distributed manner. More specifically, our framework enables different parties to collaboratively generate search logs with boosted utility while satisfying Differential Privacy. In this scenario, two privacy-preserving objectives arise: first, the collaborative sanitization should satisfy differential privacy; second, the collaborative parties cannot learn any private information from each other. We present an efficient protocol –Collaborative sEarch Log Sanitization (CELS) to meet both privacy requirements. Besides security/privacy and cost analysis, we demonstrate the utility and efficiency of our approach with real data sets.", "title": "Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility", "normalizedTitle": "Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility", "fno": "06951353", "hasPdf": true, "idPrefix": "tq", "keywords": [ "Privacy", "Histograms", "Collaboration", "Google", "Equations", "Data Privacy", "Diabetes", "Secure Multiparty Computation", "Search Log", "Differential Privacy", "Sampling", "Optimization" ], "authors": [ { "givenName": "Yuan", "surname": "Hong", "fullName": "Yuan Hong", "affiliation": "Department of Information Technology Management, State University of New York at Albany", "__typename": "ArticleAuthorType" }, { "givenName": "Jaideep", "surname": "Vaidya", "fullName": "Jaideep Vaidya", "affiliation": "Department of Management Science and Information Systems, Rutgers University", "__typename": "ArticleAuthorType" }, { "givenName": "Haibing", "surname": "Lu", "fullName": "Haibing Lu", "affiliation": "Department of Operations Management and Information Systems, Santa Clara University", "__typename": "ArticleAuthorType" }, { "givenName": "Panagiotis", "surname": "Karras", "fullName": "Panagiotis Karras", "affiliation": "Skolkovo Institute of Science and Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Sanjay", "surname": "Goel", "fullName": "Sanjay Goel", "affiliation": "Department of Information Technology Management, State University of New York at Albany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2015-09-01 00:00:00", "pubType": "trans", "pages": "504-518", "year": "2015", "issn": "1545-5971", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2016/9005/0/07840713", "title": "Improving the utility in differential private histogram publishing: Theoretical study and practice", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840713/12OmNwI8cda", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0/07847014", "title": "Privacy-Preserving Query Log Sharing Based on Prior N-Word Aggregation", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase-i-spa/2016/07847014/12OmNxYL5ao", "parentPublication": { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0", "title": "2016 IEEE Trustcom/BigDataSE/I​SPA", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2013/5303/0/06547431", "title": "Empirical privacy and empirical utility of anonymized data", "doi": null, "abstractUrl": "/proceedings-article/icdew/2013/06547431/12OmNzh5z7X", "parentPublication": { "id": "proceedings/icdew/2013/5303/0", "title": "2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/04/08368271", "title": "A Utility-Optimized Framework for Personalized Private Histogram Estimation", "doi": null, "abstractUrl": "/journal/tk/2019/04/08368271/13rRUNvyatI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019828", "title": "A Utility-Aware Visual Approach for Anonymizing Multi-Attribute Tabular Data", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019828/13rRUxE04tI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csf/2022/8417/0/841700a332", "title": "Universal Optimality and Robust Utility Bounds for Metric Differential Privacy", "doi": null, "abstractUrl": "/proceedings-article/csf/2022/841700a332/1F9QlmfCJt6", "parentPublication": { "id": "proceedings/csf/2022/8417/0/", "title": "2022 IEEE 35th Computer Security Foundations Symposium (CSF)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400c151", "title": "A Utility-Optimized Framework for Personalized Private Histogram Estimation (Extended Abstract)", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400c151/1aDSQELItJm", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2021/06/08935445", "title": "VTDP: Privately Sanitizing Fine-Grained Vehicle Trajectory Data With Boosted Utility", "doi": null, "abstractUrl": "/journal/tq/2021/06/08935445/1fPUosbLUe4", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/11/09626571", "title": "A Decentralized Mechanism Based on Differential Privacy for Privacy-Preserving Computation in Smart Grid", "doi": null, "abstractUrl": "/journal/tc/2022/11/09626571/1yNdbrbqWT6", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2021/4158/0/415800a373", "title": "The Trade-off Between Privacy and Utility in Local Differential Privacy", "doi": null, "abstractUrl": "/proceedings-article/nana/2021/415800a373/1zdPQaiTywg", "parentPublication": { "id": "proceedings/nana/2021/4158/0", "title": "2021 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06951337", "articleId": "13rRUxDqS5p", "__typename": "AdjacentArticleType" }, "next": { "fno": "06951398", "articleId": "13rRUx0xPjv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXWRFL", "name": "ttq201505-06951353s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttq201505-06951353s1.zip", "extension": "zip", "size": "86 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1DGRZtSiOdy", "title": "July", "year": "2022", "issueNum": "07", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1oHhJuMoBhe", "doi": "10.1109/TVCG.2020.3037670", "abstract": "Collecting and analyzing anonymous personal information is required as a part of data analysis processes, such as medical diagnosis and restaurant recommendation. Such data should ostensibly be stored so that specific individual information cannot be disclosed. Unfortunately, inference attacks&#x2014;integrating background knowledge and intelligent models&#x2014;hinder classic sanitization techniques like syntactic anonymity and differential privacy from exhaustively protecting sensitive information. As a solution, we introduce a three-stage approach empowered within a visual interface, which depicts underlying inference behaviors via a Bayesian Network and supports a customized defense against inference attacks from unknown adversaries. In particular, our approach visually explains the process details of the underlying privacy preserving models, allowing users to verify if the results sufficiently satisfy the requirements of privacy preservation. We demonstrate the effectiveness of our approach through two case studies and expert reviews.", "abstracts": [ { "abstractType": "Regular", "content": "Collecting and analyzing anonymous personal information is required as a part of data analysis processes, such as medical diagnosis and restaurant recommendation. Such data should ostensibly be stored so that specific individual information cannot be disclosed. Unfortunately, inference attacks&#x2014;integrating background knowledge and intelligent models&#x2014;hinder classic sanitization techniques like syntactic anonymity and differential privacy from exhaustively protecting sensitive information. As a solution, we introduce a three-stage approach empowered within a visual interface, which depicts underlying inference behaviors via a Bayesian Network and supports a customized defense against inference attacks from unknown adversaries. In particular, our approach visually explains the process details of the underlying privacy preserving models, allowing users to verify if the results sufficiently satisfy the requirements of privacy preservation. We demonstrate the effectiveness of our approach through two case studies and expert reviews.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Collecting and analyzing anonymous personal information is required as a part of data analysis processes, such as medical diagnosis and restaurant recommendation. Such data should ostensibly be stored so that specific individual information cannot be disclosed. Unfortunately, inference attacks—integrating background knowledge and intelligent models—hinder classic sanitization techniques like syntactic anonymity and differential privacy from exhaustively protecting sensitive information. As a solution, we introduce a three-stage approach empowered within a visual interface, which depicts underlying inference behaviors via a Bayesian Network and supports a customized defense against inference attacks from unknown adversaries. In particular, our approach visually explains the process details of the underlying privacy preserving models, allowing users to verify if the results sufficiently satisfy the requirements of privacy preservation. We demonstrate the effectiveness of our approach through two case studies and expert reviews.", "title": "Umbra: A Visual Analysis Approach for Defense Construction Against Inference Attacks on Sensitive Information", "normalizedTitle": "Umbra: A Visual Analysis Approach for Defense Construction Against Inference Attacks on Sensitive Information", "fno": "09258413", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Belief Networks", "Data Analysis", "Data Privacy", "Data Visualisation", "Security Of Data", "Data Analysis Processes", "Medical Diagnosis", "Restaurant Recommendation", "Specific Individual Information", "Inference Attacks Integrating Background Knowledge", "Intelligent Models Hinder Classic Sanitization Techniques", "Syntactic Anonymity", "Differential Privacy", "Sensitive Information", "Three Stage Approach", "Visual Interface", "Customized Defense", "Process Details", "Underlying Privacy Preserving Models", "Privacy Preservation", "Umbra", "Visual Analysis Approach", "Defense Construction", "Anonymous Personal Information", "Data Privacy", "Privacy", "Bayes Methods", "Visualization", "Task Analysis", "Data Visualization", "Data Models", "Privacy", "Inference Attack", "Bayesian Network", "Visual Analytics" ], "authors": [ { "givenName": "Xumeng", "surname": "Wang", "fullName": "Xumeng Wang", "affiliation": "State Key Lab of CAD&CG, Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chris", "surname": "Bryan", "fullName": "Chris Bryan", "affiliation": "Arizona State University, Phoenix, AZ, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Yiran", "surname": "Li", "fullName": "Yiran Li", "affiliation": "University of California, Davis, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Rusheng", "surname": "Pan", "fullName": "Rusheng Pan", "affiliation": "State Key Lab of CAD&CG, Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yanling", "surname": "Liu", "fullName": "Yanling Liu", "affiliation": "State Key Lab of CAD&CG, Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wei", "surname": "Chen", "fullName": "Wei Chen", "affiliation": "State Key Lab of CAD&CG, Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Kwan-Liu", "surname": "Ma", "fullName": "Kwan-Liu Ma", "affiliation": "University of California, Davis, CA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "2776-2790", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/sp/2017/5533/0/07958568", "title": "Membership Inference Attacks Against Machine Learning Models", "doi": null, "abstractUrl": "/proceedings-article/sp/2017/07958568/12OmNBUAvVc", "parentPublication": { "id": "proceedings/sp/2017/5533/0", "title": "2017 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/03/08303704", "title": "Inference Attacks and Controls on Genotypes and Phenotypes for Individual Genomic Data", "doi": null, "abstractUrl": "/journal/tb/2020/03/08303704/13rRUwI5TWa", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/08/ttk2013081849", "title": "Preventing Private Information Inference Attacks on Social Networks", "doi": null, "abstractUrl": "/journal/tk/2013/08/ttk2013081849/13rRUy0HYRU", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2018/04/07576667", "title": "Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks", "doi": null, "abstractUrl": "/journal/tq/2018/04/07576667/13rRUyuegip", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440807", "title": "GraphProtector: A Visual Interface for Employing and Assessing Multiple Privacy Preserving Graph Algorithms", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440807/17D45WrVg0m", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2021/0668/0/066800a153", "title": "Defending against Membership Inference Attacks in Federated learning via Adversarial Example", "doi": null, "abstractUrl": "/proceedings-article/msn/2021/066800a153/1CxzMpa48sU", "parentPublication": { "id": "proceedings/msn/2021/0668/0", "title": "2021 17th International Conference on Mobility, Sensing and Networking (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2019/3508/0/350800a050", "title": "Membership Inference Attacks Against Adversarially Robust Deep Learning Models", "doi": null, "abstractUrl": "/proceedings-article/spw/2019/350800a050/1dx8yXTXOak", "parentPublication": { "id": "proceedings/spw/2019/3508/0", "title": "2019 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdcat/2019/2616/0/261600a232", "title": "Protecting Sensitive Location Visits Against Inference Attacks in Trajectory Publishing", "doi": null, "abstractUrl": "/proceedings-article/pdcat/2019/261600a232/1iff3MDc4eY", "parentPublication": { "id": "proceedings/pdcat/2019/2616/0", "title": "2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2020/8786/0/878600a355", "title": "A Practical Defense against Attribute Inference Attacks in Session-based Recommendations", "doi": null, "abstractUrl": "/proceedings-article/icws/2020/878600a355/1pLJJNYNccg", "parentPublication": { "id": "proceedings/icws/2020/8786/0", "title": "2020 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09606517", "title": "Privacy Preserving Defense For Black Box Classifiers Against On-Line Adversarial Attacks", "doi": null, "abstractUrl": "/journal/tp/2022/12/09606517/1ymELUNp1ks", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09266083", "articleId": "1oZxNS1AorC", "__typename": "AdjacentArticleType" }, "next": { "fno": "09264232", "articleId": "1oSTZS811XW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1DGS5pROXde", "name": "ttg202207-09258413s1-tvcg-3037670-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202207-09258413s1-tvcg-3037670-mm.zip", "extension": "zip", "size": "24.3 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNxdDFC3", "title": "Nov.", "year": "2015", "issueNum": "11", "idPrefix": "tk", "pubType": "journal", "volume": "27", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwkfAZD", "doi": "10.1109/TKDE.2015.2448542", "abstract": "Real-world datasets often involve multiple views of data items, e.g., a Web page can be described by both its content and anchor texts of hyperlinks leading to it; photos in Flickr could be characterized by visual features, as well as user contributed tags. Different views provide information complementary to each other. Synthesizing multi-view features can lead to a comprehensive description of the data items, which could benefit many data analytic applications. Unfortunately, the simple idea of concatenating different feature vectors ignores statistical properties of each view and usually incurs the “curse of dimensionality” problem. We propose Multi-view Concept Learning (MCL), a novel nonnegative latent representation learning algorithm for capturing conceptual factors from multi-view data. MCL exploits both multi-view information and label information. The key idea is to learn a common latent space across different views which (1) captures the semantic relationships between data items through graph embedding regularization on labeled items, and (2) allows each latent factor to be associated with a subset of views via sparseness constraints. In this way, MCL could capture flexible conceptual patterns hidden in multi-view features. Experiments on a toy problem and three real-world datasets show that MCL performs well and outperforms baseline methods.", "abstracts": [ { "abstractType": "Regular", "content": "Real-world datasets often involve multiple views of data items, e.g., a Web page can be described by both its content and anchor texts of hyperlinks leading to it; photos in Flickr could be characterized by visual features, as well as user contributed tags. Different views provide information complementary to each other. Synthesizing multi-view features can lead to a comprehensive description of the data items, which could benefit many data analytic applications. Unfortunately, the simple idea of concatenating different feature vectors ignores statistical properties of each view and usually incurs the “curse of dimensionality” problem. We propose Multi-view Concept Learning (MCL), a novel nonnegative latent representation learning algorithm for capturing conceptual factors from multi-view data. MCL exploits both multi-view information and label information. The key idea is to learn a common latent space across different views which (1) captures the semantic relationships between data items through graph embedding regularization on labeled items, and (2) allows each latent factor to be associated with a subset of views via sparseness constraints. In this way, MCL could capture flexible conceptual patterns hidden in multi-view features. Experiments on a toy problem and three real-world datasets show that MCL performs well and outperforms baseline methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Real-world datasets often involve multiple views of data items, e.g., a Web page can be described by both its content and anchor texts of hyperlinks leading to it; photos in Flickr could be characterized by visual features, as well as user contributed tags. Different views provide information complementary to each other. Synthesizing multi-view features can lead to a comprehensive description of the data items, which could benefit many data analytic applications. Unfortunately, the simple idea of concatenating different feature vectors ignores statistical properties of each view and usually incurs the “curse of dimensionality” problem. We propose Multi-view Concept Learning (MCL), a novel nonnegative latent representation learning algorithm for capturing conceptual factors from multi-view data. MCL exploits both multi-view information and label information. The key idea is to learn a common latent space across different views which (1) captures the semantic relationships between data items through graph embedding regularization on labeled items, and (2) allows each latent factor to be associated with a subset of views via sparseness constraints. In this way, MCL could capture flexible conceptual patterns hidden in multi-view features. Experiments on a toy problem and three real-world datasets show that MCL performs well and outperforms baseline methods.", "title": "Multi-View Concept Learning for Data Representation", "normalizedTitle": "Multi-View Concept Learning for Data Representation", "fno": "07130644", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Encoding", "Semantics", "Optimization Methods", "Linear Programming", "Visualization", "Electronic Mail", "Multi View Learning", "Nonnegative Matrix Factorization", "Graph Embedding", "Structured Sparsity" ], "authors": [ { "givenName": "Ziyu", "surname": "Guan", "fullName": "Ziyu Guan", "affiliation": "College of Information and Technology, Northwest University of China, Xi’an, CN", "__typename": "ArticleAuthorType" }, { "givenName": "Lijun", "surname": "Zhang", "fullName": "Lijun Zhang", "affiliation": "National Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jinye", "surname": "Peng", "fullName": "Jinye Peng", "affiliation": "College of Information and Technology, Northwest University of China, Xi’an, CN", "__typename": "ArticleAuthorType" }, { "givenName": "Jianping", "surname": "Fan", "fullName": "Jianping Fan", "affiliation": "College of Information and Technology, Northwest University of China, Xi’an, CN", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2015-11-01 00:00:00", "pubType": "trans", "pages": "3016-3028", "year": "2015", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457e333", "title": "Latent Multi-view Subspace Clustering", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457e333/12OmNzUPpzc", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/04/07337427", "title": "Multi-View Clustering Based on Belief Propagation", "doi": null, "abstractUrl": "/journal/tk/2016/04/07337427/13rRUEgs2Ct", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/07/08253467", "title": "Multi-View Missing Data Completion", "doi": null, "abstractUrl": "/journal/tk/2018/07/08253467/13rRUxbTMzu", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08257909", "title": "Lifelong multi-task multi-view learning using latent spaces", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08257909/17D45WIXbRX", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545221", "title": "Adaptive Latent Representation for Multi-view Subspace Learning", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545221/17D45WaTko3", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0/661400a266", "title": "Dual Graph-Regularized Multi-view Feature Learning", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2018/661400a266/183rAfQ0GD7", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0", "title": "2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10015846", "title": "Dual-View Preference Learning for Adaptive Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/10015846/1JSl2YaejFm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300i171", "title": "Reciprocal Multi-Layer Subspace Learning for Multi-View Clustering", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300i171/1hQqykdpFq8", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/05/09258396", "title": "Deep Partial Multi-View Learning", "doi": null, "abstractUrl": "/journal/tp/2022/05/09258396/1oHhk9BNESA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09536450", "title": "Incomplete Multi-View Clustering With Reconstructed Views", "doi": null, "abstractUrl": "/journal/tk/2023/03/09536450/1wRDve2jPpu", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07124472", "articleId": "13rRUxNW1ZK", "__typename": "AdjacentArticleType" }, "next": { "fno": "07118201", "articleId": "13rRUwhpBEr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXnFvA", "name": "ttk201511-07130644s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttk201511-07130644s1.zip", "extension": "zip", "size": "82.2 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNxFJXw2", "title": "Oct.-Dec.", "year": "2014", "issueNum": "04", "idPrefix": "th", "pubType": "journal", "volume": "7", "label": "Oct.-Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUx0xPn6", "doi": "10.1109/TOH.2014.2330300", "abstract": "We currently explore the application of haptic augmentation in the context of palpation training systems. The key idea is to modify real touch sensations with computed haptic feedback. In earlier work, we have introduced an algorithmic framework for determining appropriate augmentation forces during interaction at one contact point. In this paper, we present an extension of the approach to deal with manipulations at more than one contact location. At the heart of our method is the data-driven estimation of Hunt-Crossley model parameters in a pre-computation step. Feeding the parameters into a contact dynamics model allows us to approximate the feedback behavior of various physical tissue mock-ups. Further, we combine the parameter estimation with the tracking of the position of a stiffer inclusion in the mock-up. These data are employed to create a model of movement due to external forces. The combination of these models then allows us to represent and render the mutual effects at multiple contact points. Several experiments have been carried out on a setup with two haptic devices. Comparisons of recorded with simulated interaction data demonstrate the performance and potential of our method.", "abstracts": [ { "abstractType": "Regular", "content": "We currently explore the application of haptic augmentation in the context of palpation training systems. The key idea is to modify real touch sensations with computed haptic feedback. In earlier work, we have introduced an algorithmic framework for determining appropriate augmentation forces during interaction at one contact point. In this paper, we present an extension of the approach to deal with manipulations at more than one contact location. At the heart of our method is the data-driven estimation of Hunt-Crossley model parameters in a pre-computation step. Feeding the parameters into a contact dynamics model allows us to approximate the feedback behavior of various physical tissue mock-ups. Further, we combine the parameter estimation with the tracking of the position of a stiffer inclusion in the mock-up. These data are employed to create a model of movement due to external forces. The combination of these models then allows us to represent and render the mutual effects at multiple contact points. Several experiments have been carried out on a setup with two haptic devices. Comparisons of recorded with simulated interaction data demonstrate the performance and potential of our method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We currently explore the application of haptic augmentation in the context of palpation training systems. The key idea is to modify real touch sensations with computed haptic feedback. In earlier work, we have introduced an algorithmic framework for determining appropriate augmentation forces during interaction at one contact point. In this paper, we present an extension of the approach to deal with manipulations at more than one contact location. At the heart of our method is the data-driven estimation of Hunt-Crossley model parameters in a pre-computation step. Feeding the parameters into a contact dynamics model allows us to approximate the feedback behavior of various physical tissue mock-ups. Further, we combine the parameter estimation with the tracking of the position of a stiffer inclusion in the mock-up. These data are employed to create a model of movement due to external forces. The combination of these models then allows us to represent and render the mutual effects at multiple contact points. Several experiments have been carried out on a setup with two haptic devices. Comparisons of recorded with simulated interaction data demonstrate the performance and potential of our method.", "title": "Haptic Tumor Augmentation: Exploring Multi-Point Interaction", "normalizedTitle": "Haptic Tumor Augmentation: Exploring Multi-Point Interaction", "fno": "06832631", "hasPdf": true, "idPrefix": "th", "keywords": [ "Haptic Interfaces", "Force", "Rendering Computer Graphics", "Dynamics", "Tumors", "Context", "Hardware", "Two Point Interaction", "Haptic Augmentation", "Haptic Rendering", "Tumor Rendering" ], "authors": [ { "givenName": "Seokhee", "surname": "Jeon", "fullName": "Seokhee Jeon", "affiliation": "Haptics Laboratory, Kyung Hee University, Seocheon-dong, Yongin-si, South Korea", "__typename": "ArticleAuthorType" }, { "givenName": "Matthias", "surname": "Harders", "fullName": "Matthias Harders", "affiliation": "Interactive Graphics and Simulation Group, University of Innsbruck, Innsbruck, Austria", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2014-10-01 00:00:00", "pubType": "trans", "pages": "477-485", "year": "2014", "issn": "1939-1412", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/haptic/2006/0226/0/01627126", "title": "Haptic Force Shading Parameter Effects on Path Tracing Accuracy", "doi": null, "abstractUrl": "/proceedings-article/haptic/2006/01627126/12OmNqI04FQ", "parentPublication": { "id": "proceedings/haptic/2006/0226/0", "title": "Haptic Interfaces for Virtual Environment and Teleoperator Systems, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2008/2005/0/04479948", "title": "Perceptual Rendering for Learning Haptic Skills", "doi": null, "abstractUrl": "/proceedings-article/haptics/2008/04479948/12OmNqJq4vK", "parentPublication": { "id": "proceedings/haptics/2008/2005/0", "title": "IEEE Haptics Symposium 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcis/2009/3571/4/3571d259", "title": "Contact Elements Prediction Based Haptic Rendering Method for Collaborative Virtual Assembly System", "doi": null, "abstractUrl": "/proceedings-article/gcis/2009/3571d259/12OmNwJybQW", "parentPublication": { "id": "proceedings/gcis/2009/3571/4", "title": "2009 WRI Global Congress on Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2010/9343/0/05643585", "title": "Haptic simulation of breast cancer palpation: A case study of haptic augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2010/05643585/12OmNwtn3ui", "parentPublication": { "id": "proceedings/ismar/2010/9343/0", "title": "2010 IEEE International Symposium on Mixed and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2011/4602/0/4602a271", "title": "Haptic Rendering of Virtual Hand with Force Smoothing", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2011/4602a271/12OmNx3q6XD", "parentPublication": { "id": "proceedings/icvrv/2011/4602/0", "title": "2011 International Conference on Virtual Reality and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2012/01/tth2012010077", "title": "Rendering Virtual Tumors in Real Tissue Mock-Ups Using Haptic Augmented Reality", "doi": null, "abstractUrl": "/journal/th/2012/01/tth2012010077/13rRUwInvt1", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2012/04/tth2012040344", "title": "Impulse-Based Rendering Methods for Haptic Simulation of Bone-Burring", "doi": null, "abstractUrl": "/journal/th/2012/04/tth2012040344/13rRUwhHcQZ", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2017/03/07784835", "title": "A 3-RSR Haptic Wearable Device for Rendering Fingertip Contact Forces", "doi": null, "abstractUrl": "/journal/th/2017/03/07784835/13rRUxZ0o1H", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeae/2021/9540/0/954000a077", "title": "Orthogonalization Principle for Haptic Interaction", "doi": null, "abstractUrl": "/proceedings-article/icmeae/2021/954000a077/1GZjH01JpQs", "parentPublication": { "id": "proceedings/icmeae/2021/9540/0", "title": "2021 International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797788", "title": "Haptic Interface Based on Optical Fiber Force Myography Sensor", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797788/1cJ145To15S", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06915735", "articleId": "13rRUy0qnGt", "__typename": "AdjacentArticleType" }, "next": { "fno": "06891304", "articleId": "13rRUygT7yk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNApLGHz", "title": "Feb.", "year": "2020", "issueNum": "02", "idPrefix": "ts", "pubType": "journal", "volume": "46", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyv53Hd", "doi": "10.1109/TSE.2018.2844788", "abstract": "It is common practice for developers of user-facing software to transform a mock-up of a graphical user interface (GUI) into code. This process takes place both at an application's inception and in an evolutionary context as GUI changes keep pace with evolving features. Unfortunately, this practice is challenging and time-consuming. In this paper, we present an approach that automates this process by enabling accurate prototyping of GUIs via three tasks: detection, classification, and assembly. First, logical components of a GUI are detected from a mock-up artifact using either computer vision techniques or mock-up metadata. Then, software repository mining, automated dynamic analysis, and deep convolutional neural networks are utilized to accurately classify GUI-components into domain-specific types (e.g., toggle-button). Finally, a data-driven, K-nearest-neighbors algorithm generates a suitable hierarchical GUI structure from which a prototype application can be automatically assembled. We implemented this approach for Android in a system called ReDraw. Our evaluation illustrates that ReDraw achieves an average GUI-component classification accuracy of 91 percent and assembles prototype applications that closely mirror target mock-ups in terms of visual affinity while exhibiting reasonable code structure. Interviews with industrial practitioners illustrate ReDraw's potential to improve real development workflows.", "abstracts": [ { "abstractType": "Regular", "content": "It is common practice for developers of user-facing software to transform a mock-up of a graphical user interface (GUI) into code. This process takes place both at an application's inception and in an evolutionary context as GUI changes keep pace with evolving features. Unfortunately, this practice is challenging and time-consuming. In this paper, we present an approach that automates this process by enabling accurate prototyping of GUIs via three tasks: detection, classification, and assembly. First, logical components of a GUI are detected from a mock-up artifact using either computer vision techniques or mock-up metadata. Then, software repository mining, automated dynamic analysis, and deep convolutional neural networks are utilized to accurately classify GUI-components into domain-specific types (e.g., toggle-button). Finally, a data-driven, K-nearest-neighbors algorithm generates a suitable hierarchical GUI structure from which a prototype application can be automatically assembled. We implemented this approach for Android in a system called ReDraw. Our evaluation illustrates that ReDraw achieves an average GUI-component classification accuracy of 91 percent and assembles prototype applications that closely mirror target mock-ups in terms of visual affinity while exhibiting reasonable code structure. Interviews with industrial practitioners illustrate ReDraw's potential to improve real development workflows.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "It is common practice for developers of user-facing software to transform a mock-up of a graphical user interface (GUI) into code. This process takes place both at an application's inception and in an evolutionary context as GUI changes keep pace with evolving features. Unfortunately, this practice is challenging and time-consuming. In this paper, we present an approach that automates this process by enabling accurate prototyping of GUIs via three tasks: detection, classification, and assembly. First, logical components of a GUI are detected from a mock-up artifact using either computer vision techniques or mock-up metadata. Then, software repository mining, automated dynamic analysis, and deep convolutional neural networks are utilized to accurately classify GUI-components into domain-specific types (e.g., toggle-button). Finally, a data-driven, K-nearest-neighbors algorithm generates a suitable hierarchical GUI structure from which a prototype application can be automatically assembled. We implemented this approach for Android in a system called ReDraw. Our evaluation illustrates that ReDraw achieves an average GUI-component classification accuracy of 91 percent and assembles prototype applications that closely mirror target mock-ups in terms of visual affinity while exhibiting reasonable code structure. Interviews with industrial practitioners illustrate ReDraw's potential to improve real development workflows.", "title": "Machine Learning-Based Prototyping of Graphical User Interfaces for Mobile Apps", "normalizedTitle": "Machine Learning-Based Prototyping of Graphical User Interfaces for Mobile Apps", "fno": "08374985", "hasPdf": true, "idPrefix": "ts", "keywords": [ "Computer Vision", "Data Mining", "Graphical User Interfaces", "Image Classification", "Learning Artificial Intelligence", "Mobile Computing", "Neural Nets", "Program Testing", "Prototype Application", "GUI Component Classification Accuracy", "Assembles Prototype Applications", "Target Mock Ups", "Reasonable Code Structure", "Machine Learning Based Prototyping", "Graphical User Interface", "Mobile Applications", "User Facing Software", "Evolutionary Context", "GUI Changes", "Logical Components", "Computer Vision Techniques", "Software Repository Mining", "Automated Dynamic Analysis", "Deep Convolutional Neural Networks", "Hierarchical GUI Structure", "Graphical User Interfaces", "Software", "Task Analysis", "Prototypes", "Metadata", "Androids", "Humanoid Robots", "GUI", "CNN", "Mobile", "Prototyping", "Machine Learning", "Mining Software Repositories" ], "authors": [ { "givenName": "Kevin", "surname": "Moran", "fullName": "Kevin Moran", "affiliation": "Department of Computer Science, College of William & Mary, Williamsburg, VA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Carlos", "surname": "Bernal-Cárdenas", "fullName": "Carlos Bernal-Cárdenas", "affiliation": "Department of Computer Science, College of William & Mary, Williamsburg, VA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Michael", "surname": "Curcio", "fullName": "Michael Curcio", "affiliation": "Department of Computer Science, College of William & Mary, Williamsburg, VA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Richard", "surname": "Bonett", "fullName": "Richard Bonett", "affiliation": "Department of Computer Science, College of William & Mary, Williamsburg, VA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Denys", "surname": "Poshyvanyk", "fullName": "Denys Poshyvanyk", "affiliation": "Department of Computer Science, College of William & Mary, Williamsburg, VA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2020-02-01 00:00:00", "pubType": "trans", "pages": "196-221", "year": "2020", "issn": "0098-5589", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icst/2013/4968/0/4968a499", "title": "GUIdiff -- A Regression Testing Tool for Graphical User Interfaces", "doi": null, "abstractUrl": "/proceedings-article/icst/2013/4968a499/12OmNqI04Ea", "parentPublication": { "id": "proceedings/icst/2013/4968/0", "title": "2013 IEEE Sixth International Conference on Software Testing, Verification and Validation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2016/1827/0/1827a379", "title": "Making System User Interactive Tests Repeatable: When and What Should we Control?", "doi": null, "abstractUrl": "/proceedings-article/icst/2016/1827a379/12OmNvTk06e", "parentPublication": { "id": "proceedings/icst/2016/1827/0", "title": "2016 IEEE International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwrsp/1992/3520/0/00243900", "title": "Visualizing optimization algorithms via rapid prototyping of graphical user interfaces", "doi": null, "abstractUrl": "/proceedings-article/iwrsp/1992/00243900/12OmNwOnn2d", "parentPublication": { "id": "proceedings/iwrsp/1992/3520/0", "title": "The Third International Workshop on Rapid System Prototyping", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-c/2016/4205/0/4205a689", "title": "FSMdroid: Guided GUI Testing of Android Apps", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2016/4205a689/12OmNwvVrFx", "parentPublication": { "id": "proceedings/icse-c/2016/4205/0", "title": "2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-c/2017/1589/0/07965303", "title": "Detecting Behavior Anomalies in Graphical User Interfaces", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2017/07965303/12OmNxRWI7p", "parentPublication": { "id": "proceedings/icse-c/2017/1589/0", "title": "2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esem/2017/4039/0/4039a430", "title": "How Does Machine Translated User Interface Affect User Experience? A Study on Android Apps", "doi": null, "abstractUrl": "/proceedings-article/esem/2017/4039a430/12OmNyQ7FTY", "parentPublication": { "id": "proceedings/esem/2017/4039/0", "title": "2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2018/5638/0/563801a165", "title": "Automated Reporting of GUI Design Violations for Mobile Apps", "doi": null, "abstractUrl": "/proceedings-article/icse/2018/563801a165/13l5O9DW85M", "parentPublication": { "id": "proceedings/icse/2018/5638/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2015/05/mso2015050053", "title": "MobiGUITAR: Automated Model-Based Testing of Mobile Apps", "doi": null, "abstractUrl": "/magazine/so/2015/05/mso2015050053/13rRUx0xPl2", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2018/2666/1/266601a090", "title": "Exploration Scheduling for Replay Events in GUI Testing on Android Apps", "doi": null, "abstractUrl": "/proceedings-article/compsac/2018/266601a090/144U9bx2KPe", "parentPublication": { "id": "proceedings/compsac/2018/2666/2", "title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2015/6949/0/6949a931", "title": "What the App is That? Deception and Countermeasures in the Android User Interface", "doi": null, "abstractUrl": "/proceedings-article/sp/2015/6949a931/17D45WHONqN", "parentPublication": { "id": "proceedings/sp/2015/6949/0", "title": "2015 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08373739", "articleId": "13rRUxAAT2Z", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzFdtc6", "title": "November/December", "year": "2010", "issueNum": "06", "idPrefix": "tg", "pubType": "journal", "volume": "16", "label": "November/December", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxBa5bP", "doi": "10.1109/TVCG.2010.161", "abstract": "How do we know if what we see is really there? When visualizing data, how do we avoid falling into the trap of apophenia where we see patterns in random noise? Traditionally, infovis has been concerned with discovering new relationships, and statistics with preventing spurious relationships from being reported. We pull these opposing poles closer with two new techniques for rigorous statistical inference of visual discoveries. The \"Rorschach\" helps the analyst calibrate their understanding of uncertainty and \"line-up\" provides a protocol for assessing the significance of visual discoveries, protecting against the discovery of spurious structure.", "abstracts": [ { "abstractType": "Regular", "content": "How do we know if what we see is really there? When visualizing data, how do we avoid falling into the trap of apophenia where we see patterns in random noise? Traditionally, infovis has been concerned with discovering new relationships, and statistics with preventing spurious relationships from being reported. We pull these opposing poles closer with two new techniques for rigorous statistical inference of visual discoveries. The \"Rorschach\" helps the analyst calibrate their understanding of uncertainty and \"line-up\" provides a protocol for assessing the significance of visual discoveries, protecting against the discovery of spurious structure.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "How do we know if what we see is really there? When visualizing data, how do we avoid falling into the trap of apophenia where we see patterns in random noise? Traditionally, infovis has been concerned with discovering new relationships, and statistics with preventing spurious relationships from being reported. We pull these opposing poles closer with two new techniques for rigorous statistical inference of visual discoveries. The \"Rorschach\" helps the analyst calibrate their understanding of uncertainty and \"line-up\" provides a protocol for assessing the significance of visual discoveries, protecting against the discovery of spurious structure.", "title": "Graphical inference for infovis", "normalizedTitle": "Graphical inference for infovis", "fno": "ttg2010060973", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Statistics", "Visual Testing", "Permutation Tests", "Null Hypotheses", "Data Plot" ], "authors": [ { "givenName": "Hadley", "surname": "Wickham", "fullName": "Hadley Wickham", "affiliation": "Rice University", "__typename": "ArticleAuthorType" }, { "givenName": "Dianne", "surname": "Cook", "fullName": "Dianne Cook", "affiliation": "Iowa State University", "__typename": "ArticleAuthorType" }, { "givenName": "Heike", "surname": "Hofmann", "fullName": "Heike Hofmann", "affiliation": "Iowa State University", "__typename": "ArticleAuthorType" }, { "givenName": "Andreas", "surname": "Buja", "fullName": "Andreas Buja", "affiliation": "Wharton School, University of Pennsylvania", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2010-11-01 00:00:00", "pubType": "trans", "pages": "973-979", "year": "2010", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tg/2021/02/09222327", "title": "Rainbows Revisited: Modeling Effective Colormap Design for Graphical Inference", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222327/1nTqMLwYD0A", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2010060963", "articleId": "13rRUNvgziA", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2010060980", "articleId": "13rRUxZRbnY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KaBaMU2Iog", "doi": "10.1109/TVCG.2023.3238989", "abstract": "It is common to advise against using 3D to visualize abstract data such as networks, however Ware and Mitchell&#x0027;s 2008 study showed that path tracing in a network is less error prone in 3D than in 2D. It is unclear, however, if 3D retains its advantage when the 2D presentation of a network is improved using edge-routing, and when simple interaction techniques for exploring the network are available. We address this with two studies of path tracing under new conditions. The first study was preregistered, involved 34 users, and compared 2D and 3D layouts that the user could rotate and move in virtual reality with a handheld controller. Error rates were lower in 3D than in 2D, despite the use of edge-routing in 2D and the use of mouse-driven interactive highlighting of edges. The second study involved 12 users and investigated data physicalization, comparing 3D layouts in virtual reality versus physical 3D printouts of networks augmented with a Microsoft HoloLens headset. No difference was found in error rate, but users performed a variety of actions with their fingers in the physical condition which can inform new interaction techniques.", "abstracts": [ { "abstractType": "Regular", "content": "It is common to advise against using 3D to visualize abstract data such as networks, however Ware and Mitchell&#x0027;s 2008 study showed that path tracing in a network is less error prone in 3D than in 2D. It is unclear, however, if 3D retains its advantage when the 2D presentation of a network is improved using edge-routing, and when simple interaction techniques for exploring the network are available. We address this with two studies of path tracing under new conditions. The first study was preregistered, involved 34 users, and compared 2D and 3D layouts that the user could rotate and move in virtual reality with a handheld controller. Error rates were lower in 3D than in 2D, despite the use of edge-routing in 2D and the use of mouse-driven interactive highlighting of edges. The second study involved 12 users and investigated data physicalization, comparing 3D layouts in virtual reality versus physical 3D printouts of networks augmented with a Microsoft HoloLens headset. No difference was found in error rate, but users performed a variety of actions with their fingers in the physical condition which can inform new interaction techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "It is common to advise against using 3D to visualize abstract data such as networks, however Ware and Mitchell's 2008 study showed that path tracing in a network is less error prone in 3D than in 2D. It is unclear, however, if 3D retains its advantage when the 2D presentation of a network is improved using edge-routing, and when simple interaction techniques for exploring the network are available. We address this with two studies of path tracing under new conditions. The first study was preregistered, involved 34 users, and compared 2D and 3D layouts that the user could rotate and move in virtual reality with a handheld controller. Error rates were lower in 3D than in 2D, despite the use of edge-routing in 2D and the use of mouse-driven interactive highlighting of edges. The second study involved 12 users and investigated data physicalization, comparing 3D layouts in virtual reality versus physical 3D printouts of networks augmented with a Microsoft HoloLens headset. No difference was found in error rate, but users performed a variety of actions with their fingers in the physical condition which can inform new interaction techniques.", "title": "Path Tracing in 2D, 3D, and Physicalized Networks", "normalizedTitle": "Path Tracing in 2D, 3D, and Physicalized Networks", "fno": "10024310", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Three Dimensional Displays", "Layout", "Task Analysis", "Headphones", "Data Visualization", "Mice", "Visualization", "Graph Visualization", "3 D Printing", "Augmented Reality", "Data Physicalization", "Tangible", "Path Following", "Path Finding" ], "authors": [ { "givenName": "Michael J.", "surname": "McGuffin", "fullName": "Michael J. McGuffin", "affiliation": "École de technologie supérieure, Montreal, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "Ryan", "surname": "Servera", "fullName": "Ryan Servera", "affiliation": "École de technologie supérieure, Montreal, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "Marie", "surname": "Forest", "fullName": "Marie Forest", "affiliation": "École de technologie supérieure, Montreal, Canada", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2005/2766/0/01532837", "title": "Eyegaze analysis of displays with combined 2D and 3D views", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/01532837/12OmNBvkdk6", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457b942", "title": "Generating Holistic 3D Scene Abstractions for Text-Based Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457b942/12OmNvoWV1x", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2015/6886/0/07131755", "title": "Mapping 2D input to 3D immersive spatial augmented reality", "doi": null, "abstractUrl": "/proceedings-article/3dui/2015/07131755/12OmNwAKCNT", "parentPublication": { "id": "proceedings/3dui/2015/6886/0", "title": "2015 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dvis/2014/6826/0/07160095", "title": "Beyond the classical monoscopic 3D in graph analytics: An experimental study of the impact of stereoscopy", "doi": null, "abstractUrl": "/proceedings-article/3dvis/2014/07160095/12OmNxwENmo", "parentPublication": { "id": "proceedings/3dvis/2014/6826/0", "title": "2014 IEEE VIS International Workshop on 3DVis (3DVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2015/7343/0/07314295", "title": "Hybrid-Dimensional Visualization and Interaction - Integrating 2D and 3D Visualization with Semi-Immersive Navigation Techniques", "doi": null, "abstractUrl": "/proceedings-article/bdva/2015/07314295/12OmNzBOi7E", "parentPublication": { "id": "proceedings/bdva/2015/7343/0", "title": "2015 Big Data Visual Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sose/2017/6320/0/07943298", "title": "A 2D and 3D Indoor Mapping Approach for Virtual Navigation Services", "doi": null, "abstractUrl": "/proceedings-article/sose/2017/07943298/12OmNzcxZuL", "parentPublication": { "id": "proceedings/sose/2017/6320/0", "title": "2017 11th IEEE Symposium on Service-Oriented System Engineering (SOSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/01/06826569", "title": "The Impact of Interactivity on Comprehending 2D and 3D Visualizations of Movement Data", "doi": null, "abstractUrl": "/journal/tg/2015/01/06826569/13rRUyYjKah", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b836", "title": "SAT: 2D Semantics Assisted Training for 3D Visual Grounding", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b836/1BmEKYN6gbS", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200k0913", "title": "3D-FRONT: 3D Furnished Rooms with layOuts and semaNTics", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200k0913/1BmEzQDqGek", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/04/08906136", "title": "Global Beautification of 2D and 3D Layouts With Interactive Ambiguity Resolution", "doi": null, "abstractUrl": "/journal/tg/2021/04/08906136/1f5qMIjZR5K", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10024360", "articleId": "1KaBabqZxSg", "__typename": "AdjacentArticleType" }, "next": { "fno": "10025396", "articleId": "1KcgWzIu8F2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1KcgZ6aRZLO", "name": "ttg555501-010024310s1-supp1-3238989.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg555501-010024310s1-supp1-3238989.pdf", "extension": "pdf", "size": "15.1 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNAXPy7C", "title": "March", "year": "2012", "issueNum": "03", "idPrefix": "si", "pubType": "journal", "volume": "20", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxNEqNc", "doi": "10.1109/TVLSI.2010.2102374", "abstract": "With the continuous shrinking of the feature size, the effect of stress on the performance of the IC device and circuit can no longer be ignored. In fact, stress engineering is becoming more and more widely used today in advanced IC manufacture processes to improve device performance. Different from the intentionally introduced stresses to improve circuit performance, the shallow-trench-isolation (STI) stress, which is exerted by STI wells on the active area of devices, is a by-product of the fabrication process and has increasingly significant impact on the circuit behavior. This paper proposes a complete flow to characterize the influence of STI stress on the performance of RF/analog circuits by considering detailed layout and process information. An accurate and efficient finite-element method-based stress simulator has been developed to extract stress distribution from layouts of IC designs. The existing MOSFET model is also enhanced to capture the effects of stress on mobility, threshold voltage. With the enhanced model, we are able to study the influence of layout-dependent STI stress on the performance of real circuits and establish corresponding optimization strategies. The proposed flow has been applied to a series of RF/analog IC designs based on a 90-nm CMOS technology.", "abstracts": [ { "abstractType": "Regular", "content": "With the continuous shrinking of the feature size, the effect of stress on the performance of the IC device and circuit can no longer be ignored. In fact, stress engineering is becoming more and more widely used today in advanced IC manufacture processes to improve device performance. Different from the intentionally introduced stresses to improve circuit performance, the shallow-trench-isolation (STI) stress, which is exerted by STI wells on the active area of devices, is a by-product of the fabrication process and has increasingly significant impact on the circuit behavior. This paper proposes a complete flow to characterize the influence of STI stress on the performance of RF/analog circuits by considering detailed layout and process information. An accurate and efficient finite-element method-based stress simulator has been developed to extract stress distribution from layouts of IC designs. The existing MOSFET model is also enhanced to capture the effects of stress on mobility, threshold voltage. With the enhanced model, we are able to study the influence of layout-dependent STI stress on the performance of real circuits and establish corresponding optimization strategies. The proposed flow has been applied to a series of RF/analog IC designs based on a 90-nm CMOS technology.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the continuous shrinking of the feature size, the effect of stress on the performance of the IC device and circuit can no longer be ignored. In fact, stress engineering is becoming more and more widely used today in advanced IC manufacture processes to improve device performance. Different from the intentionally introduced stresses to improve circuit performance, the shallow-trench-isolation (STI) stress, which is exerted by STI wells on the active area of devices, is a by-product of the fabrication process and has increasingly significant impact on the circuit behavior. This paper proposes a complete flow to characterize the influence of STI stress on the performance of RF/analog circuits by considering detailed layout and process information. An accurate and efficient finite-element method-based stress simulator has been developed to extract stress distribution from layouts of IC designs. The existing MOSFET model is also enhanced to capture the effects of stress on mobility, threshold voltage. With the enhanced model, we are able to study the influence of layout-dependent STI stress on the performance of real circuits and establish corresponding optimization strategies. The proposed flow has been applied to a series of RF/analog IC designs based on a 90-nm CMOS technology.", "title": "A Framework for Layout-dependent STI Stress Analysis and Stress-aware Circuit Optimization", "normalizedTitle": "A Framework for Layout-dependent STI Stress Analysis and Stress-aware Circuit Optimization", "fno": "05703168", "hasPdf": true, "idPrefix": "si", "keywords": [ "Analogue Integrated Circuits", "Circuit Optimisation", "CMOS Integrated Circuits", "Finite Element Analysis", "Isolation Technology", "MOSFET", "Radiofrequency Integrated Circuits", "Stress Analysis", "Layout Dependent STI Stress Analysis", "Stress Aware Circuit Optimization", "Stress Engineering", "IC Manufacture Process", "Shallow Trench Isolation Stress", "RF Analog Circuit", "Finite Element Method", "Stress Simulator", "Stress Distribution", "MOSFET Model", "Threshold Voltage", "RF Analog IC Design", "CMOS Technology", "Size 90 Nm", "Stress", "Layout", "Integrated Circuit Modeling", "Shape", "Transistors", "Solid Modeling", "Circuit Optimization", "Layout Dependent", "Modeling", "Optimization", "Parallel Processing", "Simulation", "Stress" ], "authors": [ { "givenName": "Jiying", "surname": "Xue", "fullName": "Jiying Xue", "affiliation": "Institute of Microelectronics, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yangdong", "surname": "Deng", "fullName": "Yangdong Deng", "affiliation": "Institute of Microelectronics, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zuochang", "surname": "Ye", "fullName": "Zuochang Ye", "affiliation": "Institute of Microelectronics, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hongrui", "surname": "Wang", "fullName": "Hongrui Wang", "affiliation": "Institute of Microelectronics, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Liu", "surname": "Yang", "fullName": "Liu Yang", "affiliation": "Institute of Microelectronics, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhiping", "surname": "Yu", "fullName": "Zhiping Yu", "affiliation": "Institute of Microelectronics, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2012-03-01 00:00:00", "pubType": "trans", "pages": "498-511", "year": "2012", "issn": "1063-8210", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/nanoarch/2012/1671/0/06464152", "title": "A Markovian, variation-aware circuit-level aging model", "doi": null, "abstractUrl": "/proceedings-article/nanoarch/2012/06464152/12OmNB7LvHn", "parentPublication": { "id": "proceedings/nanoarch/2012/1671/0", "title": "2012 IEEE/ACM International Symposium on Nanoscale Architectures (NANOARCH 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2010/4108/0/4108b196", "title": "Massively Parallel Finite Element Simulator for Full-Chip STI Stress Analysis", "doi": null, "abstractUrl": "/proceedings-article/cit/2010/4108b196/12OmNCgrDbQ", "parentPublication": { "id": "proceedings/cit/2010/4108/0", "title": "Computer and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/idt/2009/5750/0/05404119", "title": "Physical aware design methodology for analog & mixed signal integrated circuits", "doi": null, "abstractUrl": "/proceedings-article/idt/2009/05404119/12OmNCmpcMY", "parentPublication": { "id": "proceedings/idt/2009/5750/0", "title": "2009 4th International Design and Test Workshop (IDT 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ats/2016/3809/0/3809a156", "title": "Layout-Oriented Defect Set Reduction for Fast Circuit Simulation in Cell-Aware Test", "doi": null, "abstractUrl": "/proceedings-article/ats/2016/3809a156/12OmNvA1hEt", "parentPublication": { "id": "proceedings/ats/2016/3809/0", "title": "2016 IEEE 25th Asian Test Symposium (ATS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/idt/2009/5750/0/05404115", "title": "Implementing a methodology for process variation awareness of design context and its impact on circuit analysis", "doi": null, "abstractUrl": "/proceedings-article/idt/2009/05404115/12OmNxd4tm8", "parentPublication": { "id": "proceedings/idt/2009/5750/0", "title": "2009 4th International Design and Test Workshop (IDT 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ats/2012/4876/0/4876a031", "title": "TSV Stress-Aware ATPG for 3D Stacked ICs", "doi": null, "abstractUrl": "/proceedings-article/ats/2012/4876a031/12OmNzBOhuE", "parentPublication": { "id": "proceedings/ats/2012/4876/0", "title": "2012 IEEE 21st Asian Test Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isqed/2009/2952/0/04810335", "title": "CAD utilities to comprehend layout-dependent stress effects in 45 nm high- performance SOI custom macro design", "doi": null, "abstractUrl": "/proceedings-article/isqed/2009/04810335/12OmNzCF4Zz", "parentPublication": { "id": "proceedings/isqed/2009/2952/0", "title": "Quality Electronic Design, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/2007/1381/0/04397248", "title": "Exploiting STI stress for performance", "doi": null, "abstractUrl": "/proceedings-article/iccad/2007/04397248/12OmNzn38WX", "parentPublication": { "id": "proceedings/iccad/2007/1381/0", "title": "2007 IEEE/ACM International Conference on Computer Aided Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2015/07/06870451", "title": "A Holistic Analysis of Circuit Performance Variations in 3-D ICs With Thermal and TSV-Induced Stress Considerations", "doi": null, "abstractUrl": "/journal/si/2015/07/06870451/13rRUyXKxOZ", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2018/12/08463602", "title": "Circuit Performance Shifts Due to Layout-Dependent Stress in Planar and 3D-ICs", "doi": null, "abstractUrl": "/journal/si/2018/12/08463602/17D45XvMcee", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "05710023", "articleId": "13rRUwcS1wr", "__typename": "AdjacentArticleType" }, "next": { "fno": "05706399", "articleId": "13rRUyXKxS1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNAWYKCh", "title": "Sept.", "year": "2017", "issueNum": "09", "idPrefix": "tp", "pubType": "journal", "volume": "39", "label": "Sept.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyYjKbG", "doi": "10.1109/TPAMI.2016.2613866", "abstract": "Helical objects occur in medicine, biology, cosmetics, nanotechnology, and engineering. Extracting a 3D parametric curve from a 2D image of a helical object has many practical applications, in particular being able to extract metrics such as tortuosity, frequency, and pitch. We present a method that is able to straighten the image object and derive a robust 3D helical curve from peaks in the object boundary. The algorithm has a small number of stable parameters that require little tuning, and the curve is validated against both synthetic and real-world data. The results show that the extracted 3D curve comes within close Hausdorff distance to the ground truth, and has near identical tortuosity for helical objects with a circular profile. Parameter insensitivity and robustness against high levels of image noise are demonstrated thoroughly and quantitatively.", "abstracts": [ { "abstractType": "Regular", "content": "Helical objects occur in medicine, biology, cosmetics, nanotechnology, and engineering. Extracting a 3D parametric curve from a 2D image of a helical object has many practical applications, in particular being able to extract metrics such as tortuosity, frequency, and pitch. We present a method that is able to straighten the image object and derive a robust 3D helical curve from peaks in the object boundary. The algorithm has a small number of stable parameters that require little tuning, and the curve is validated against both synthetic and real-world data. The results show that the extracted 3D curve comes within close Hausdorff distance to the ground truth, and has near identical tortuosity for helical objects with a circular profile. Parameter insensitivity and robustness against high levels of image noise are demonstrated thoroughly and quantitatively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Helical objects occur in medicine, biology, cosmetics, nanotechnology, and engineering. Extracting a 3D parametric curve from a 2D image of a helical object has many practical applications, in particular being able to extract metrics such as tortuosity, frequency, and pitch. We present a method that is able to straighten the image object and derive a robust 3D helical curve from peaks in the object boundary. The algorithm has a small number of stable parameters that require little tuning, and the curve is validated against both synthetic and real-world data. The results show that the extracted 3D curve comes within close Hausdorff distance to the ground truth, and has near identical tortuosity for helical objects with a circular profile. Parameter insensitivity and robustness against high levels of image noise are demonstrated thoroughly and quantitatively.", "title": "Extracting 3D Parametric Curves from 2D Images of Helical Objects", "normalizedTitle": "Extracting 3D Parametric Curves from 2D Images of Helical Objects", "fno": "07577877", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Three Dimensional Displays", "Two Dimensional Displays", "Shape", "Hair", "Skeleton", "Splines Mathematics", "Helical Curves", "Shape Analysis", "Feature Extraction", "Geometry", "Modeling", "Skeletonization" ], "authors": [ { "givenName": "Chris G.", "surname": "Willcocks", "fullName": "Chris G. Willcocks", "affiliation": "School of Engineering and Computing Sciences, Durham University, Durham, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Philip T. G.", "surname": "Jackson", "fullName": "Philip T. G. Jackson", "affiliation": "School of Engineering and Computing Sciences, Durham University, Durham, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Carl J.", "surname": "Nelson", "fullName": "Carl J. Nelson", "affiliation": "School of Engineering and Computing Sciences, Durham University, Durham, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Boguslaw", "surname": "Obara", "fullName": "Boguslaw Obara", "affiliation": "School of Engineering and Computing Sciences, Durham University, Durham, United Kingdom", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "09", "pubDate": "2017-09-01 00:00:00", "pubType": "trans", "pages": "1757-1769", "year": "2017", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2015/8391/0/8391c363", "title": "Towards Pointless Structure from Motion: 3D Reconstruction and Camera Parameters from General 3D Curves", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391c363/12OmNBhZ4eA", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a252", "title": "An Extension Algorithm for Ball B-Spline Curves with G2 Continuity", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a252/12OmNC8MsKH", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2013/2576/0/06814978", "title": "Fitting Multiple Curves to Point Clouds with Complicated Topological Structures", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2013/06814978/12OmNxwncAi", "parentPublication": { "id": "proceedings/cad-graphics/2013/2576/0", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2013/2576/0/06815031", "title": "Direct Extraction of Feature Curves from Volume Image for Illustration and Vectorization Based on 2D/3D Curve Mapping", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2013/06815031/12OmNz4Bdq1", "parentPublication": { "id": "proceedings/cad-graphics/2013/2576/0", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/02/08437147", "title": "Inferring Spatial Organization of Individual Topologically Associated Domains via Piecewise Helical Model", "doi": null, "abstractUrl": "/journal/tb/2020/02/08437147/13rRUxDqS6W", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09741325", "title": "Robustly Extracting Concise 3D Curve Skeletons by Enhancing the Capture of Prominent Features", "doi": null, "abstractUrl": "/journal/tg/5555/01/09741325/1C0jdavrcC4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2023/4815/0/481500a367", "title": "WARPY: Sketching Environment-Aware 3D Curves in Mobile Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2023/481500a367/1MNgJRvtdtu", "parentPublication": { "id": "proceedings/vr/2023/4815/0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/10106045", "title": "Helical Three Dimensional Reconstruction Using Bayesian Optimization for Cryogenic Electron Microscopy", "doi": null, "abstractUrl": "/journal/tb/5555/01/10106045/1MuViZJN0T6", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222374", "title": "Data-Driven Space-Filling Curves", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222374/1nTqIxy4mQM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2021/03/09392277", "title": "Skeleton-Based Parametric 2-D Region Representation: Disk B-Spline Curves", "doi": null, "abstractUrl": "/magazine/cg/2021/03/09392277/1sq7H56VfiM", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07572201", "articleId": "13rRUy2YLUc", "__typename": "AdjacentArticleType" }, "next": { "fno": "07588132", "articleId": "13rRUxcbnDN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxFJXw2", "title": "Oct.-Dec.", "year": "2014", "issueNum": "04", "idPrefix": "th", "pubType": "journal", "volume": "7", "label": "Oct.-Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUytF41L", "doi": "10.1109/TOH.2014.2321395", "abstract": "Manual human-computer interfaces for virtual reality are designed to allow an operator interacting with a computer simulation as naturally as possible. Dexterous haptic interfaces are the best suited for this goal. They give intuitive and efficient control on the environment with haptic and tactile feedback. This paper is aimed at helping in the choice of the interaction areas to be taken into account in the design of such interfaces. The literature dealing with hand interactions is first reviewed in order to point out the contact areas involved in exploration and manipulation tasks. Their frequencies of use are then extracted from existing recordings. The results are gathered in an original graphical interaction map allowing for a simple visualization of the way the hand is used, and compared with a map of mechanoreceptors densities. Then an interaction tree, mapping the relative amount of actions made available through the use of a given contact area, is built and correlated with the losses of hand function induced by amputations. A rating of some existing haptic interfaces and guidelines for their design are finally achieved to illustrate a possible use of the developed graphical tools.", "abstracts": [ { "abstractType": "Regular", "content": "Manual human-computer interfaces for virtual reality are designed to allow an operator interacting with a computer simulation as naturally as possible. Dexterous haptic interfaces are the best suited for this goal. They give intuitive and efficient control on the environment with haptic and tactile feedback. This paper is aimed at helping in the choice of the interaction areas to be taken into account in the design of such interfaces. The literature dealing with hand interactions is first reviewed in order to point out the contact areas involved in exploration and manipulation tasks. Their frequencies of use are then extracted from existing recordings. The results are gathered in an original graphical interaction map allowing for a simple visualization of the way the hand is used, and compared with a map of mechanoreceptors densities. Then an interaction tree, mapping the relative amount of actions made available through the use of a given contact area, is built and correlated with the losses of hand function induced by amputations. A rating of some existing haptic interfaces and guidelines for their design are finally achieved to illustrate a possible use of the developed graphical tools.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Manual human-computer interfaces for virtual reality are designed to allow an operator interacting with a computer simulation as naturally as possible. Dexterous haptic interfaces are the best suited for this goal. They give intuitive and efficient control on the environment with haptic and tactile feedback. This paper is aimed at helping in the choice of the interaction areas to be taken into account in the design of such interfaces. The literature dealing with hand interactions is first reviewed in order to point out the contact areas involved in exploration and manipulation tasks. Their frequencies of use are then extracted from existing recordings. The results are gathered in an original graphical interaction map allowing for a simple visualization of the way the hand is used, and compared with a map of mechanoreceptors densities. Then an interaction tree, mapping the relative amount of actions made available through the use of a given contact area, is built and correlated with the losses of hand function induced by amputations. A rating of some existing haptic interfaces and guidelines for their design are finally achieved to illustrate a possible use of the developed graphical tools.", "title": "Analysis of Hand Contact Areas and Interaction Capabilities During Manipulation and Exploration", "normalizedTitle": "Analysis of Hand Contact Areas and Interaction Capabilities During Manipulation and Exploration", "fno": "06809988", "hasPdf": true, "idPrefix": "th", "keywords": [ "Thumb", "Indexes", "Taxonomy", "Robots", "Grasping", "Taxonomy", "Human Factors", "Ergonomics", "Human Computer Interactions", "Haptic Interfaces" ], "authors": [ { "givenName": "Franck", "surname": "Gonzalez", "fullName": "Franck Gonzalez", "affiliation": "CEA, LIST, Interactive Robotics Laboratory, F-91190 Gif-sur-Yvette, France, and Sorbonne Universitès, UPMC Univ Paris 06, CNRS UMR 7222, INSERM U 1150, Institut des Systèmes Intelligents et de Robotique, Equipe Agathe, Paris, France", "__typename": "ArticleAuthorType" }, { "givenName": "Florian", "surname": "Gosselin", "fullName": "Florian Gosselin", "affiliation": "CEA, LIST, Interactive Robotics Laboratory, F-91190 Gif-sur-Yvette, France", "__typename": "ArticleAuthorType" }, { "givenName": "Wael", "surname": "Bachta", "fullName": "Wael Bachta", "affiliation": "Sorbonne Universitès, UPMC Univ Paris 06, CNRS UMR 7222, INSERM U 1150, Institut des Systèmes Intelligents et de Robotique, Equipe Agathe, Paris, France", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "04", "pubDate": "2014-10-01 00:00:00", "pubType": "trans", "pages": "415-429", "year": "2014", "issn": "1939-1412", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/whc/2009/3858/0/04810909", "title": "Displaying realistic contact accelerations via a dedicated vibration actuator", "doi": null, "abstractUrl": "/proceedings-article/whc/2009/04810909/12OmNCd2rmv", "parentPublication": { "id": "proceedings/whc/2009/3858/0", "title": "World Haptics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2016/0842/0/07460024", "title": "DesktopGlove: A multi-finger force feedback interface separating degrees of freedom between hands", "doi": null, "abstractUrl": "/proceedings-article/3dui/2016/07460024/12OmNqBtj5v", "parentPublication": { "id": "proceedings/3dui/2016/0842/0", "title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2013/6097/0/06550240", "title": "Poster: Auditory feedback of contact state during object manipulation", "doi": null, "abstractUrl": "/proceedings-article/3dui/2013/06550240/12OmNzBOikr", "parentPublication": { "id": "proceedings/3dui/2013/6097/0", "title": "2013 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icarsc/2016/2255/0/07781961", "title": "A Novel Underactuated Hand Suitable for Human-Oriented Domestic Environments", "doi": null, "abstractUrl": "/proceedings-article/icarsc/2016/07781961/12OmNzvhvw5", "parentPublication": { "id": "proceedings/icarsc/2016/2255/0", "title": "2016 International Conference on Autonomous Robot Systems and Competitions (ICARSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2013/02/tth2013020129", "title": "A Hand-Centric Classification of Human and Robot Dexterous Manipulation", "doi": null, "abstractUrl": "/journal/th/2013/02/tth2013020129/13rRUwdrdSF", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2014/03/06822601", "title": "Analysis of Human Grasping Behavior: Object Characteristics and Grasp Type", "doi": null, "abstractUrl": "/journal/th/2014/03/06822601/13rRUxBrGhb", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2013/03/tth2013030296", "title": "Grasp Frequency and Usage in Daily Household and Machine Shop Tasks", "doi": null, "abstractUrl": "/journal/th/2013/03/tth2013030296/13rRUy0HYRE", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2017/04/07922602", "title": "Wearable Haptic Systems for the Fingertip and the Hand: Taxonomy, Review, and Perspectives", "doi": null, "abstractUrl": "/journal/th/2017/04/07922602/13rRUy3gn7I", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2019/7789/0/08679400", "title": "Force Arrow 2: A Novel Pseudo-Haptic Interface for Weight Perception in Lifting Virtual Objects", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2019/08679400/18XkloCZdW8", "parentPublication": { "id": "proceedings/bigcomp/2019/7789/0", "title": "2019 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a709", "title": "Digit Force Control for Dexterous Manipulation: Effects of Contact Surface Stiffness and Object&#x2019;s Center of Mass", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a709/1pBMp2NFrAk", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06994334", "articleId": "13rRUEgarjA", "__typename": "AdjacentArticleType" }, "next": { "fno": "06822621", "articleId": "13rRUx0geA2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1MQvcIkoAko", "title": "June", "year": "2023", "issueNum": "06", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1ADJfMYBSCs", "doi": "10.1109/TVCG.2022.3148007", "abstract": "Utilizing Visualization-oriented Natural Language Interfaces (V-NLI) as a complementary input modality to direct manipulation for visual analytics can provide an engaging user experience. It enables users to focus on their tasks rather than having to worry about how to operate visualization tools on the interface. In the past two decades, leveraging advanced natural language processing technologies, numerous V-NLI systems have been developed in academic research and commercial software, especially in recent years. In this article, we conduct a comprehensive review of the existing V-NLIs. In order to classify each article, we develop categorical dimensions based on a classic information visualization pipeline with the extension of a V-NLI layer. The following seven stages are used: query interpretation, data transformation, visual mapping, view transformation, human interaction, dialogue management, and presentation. Finally, we also shed light on several promising directions for future work in the V-NLI community.", "abstracts": [ { "abstractType": "Regular", "content": "Utilizing Visualization-oriented Natural Language Interfaces (V-NLI) as a complementary input modality to direct manipulation for visual analytics can provide an engaging user experience. It enables users to focus on their tasks rather than having to worry about how to operate visualization tools on the interface. In the past two decades, leveraging advanced natural language processing technologies, numerous V-NLI systems have been developed in academic research and commercial software, especially in recent years. In this article, we conduct a comprehensive review of the existing V-NLIs. In order to classify each article, we develop categorical dimensions based on a classic information visualization pipeline with the extension of a V-NLI layer. The following seven stages are used: query interpretation, data transformation, visual mapping, view transformation, human interaction, dialogue management, and presentation. Finally, we also shed light on several promising directions for future work in the V-NLI community.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Utilizing Visualization-oriented Natural Language Interfaces (V-NLI) as a complementary input modality to direct manipulation for visual analytics can provide an engaging user experience. It enables users to focus on their tasks rather than having to worry about how to operate visualization tools on the interface. In the past two decades, leveraging advanced natural language processing technologies, numerous V-NLI systems have been developed in academic research and commercial software, especially in recent years. In this article, we conduct a comprehensive review of the existing V-NLIs. In order to classify each article, we develop categorical dimensions based on a classic information visualization pipeline with the extension of a V-NLI layer. The following seven stages are used: query interpretation, data transformation, visual mapping, view transformation, human interaction, dialogue management, and presentation. Finally, we also shed light on several promising directions for future work in the V-NLI community.", "title": "Towards Natural Language Interfaces for Data Visualization: A Survey", "normalizedTitle": "Towards Natural Language Interfaces for Data Visualization: A Survey", "fno": "09699035", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualization", "Visualization", "Natural Language Processing", "Task Analysis", "Human Computer Interaction", "Software", "Data Mining", "Data Visualization", "Natural Language Interfaces", "Survey" ], "authors": [ { "givenName": "Leixian", "surname": "Shen", "fullName": "Leixian Shen", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Enya", "surname": "Shen", "fullName": "Enya Shen", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yuyu", "surname": "Luo", "fullName": "Yuyu Luo", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaocong", "surname": "Yang", "fullName": "Xiaocong Yang", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xuming", "surname": "Hu", "fullName": "Xuming Hu", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiongshuai", "surname": "Zhang", "fullName": "Xiongshuai Zhang", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhiwei", "surname": "Tai", "fullName": "Zhiwei Tai", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jianmin", "surname": "Wang", "fullName": "Jianmin Wang", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2023-06-01 00:00:00", "pubType": "trans", "pages": "3121-3144", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "mags/ic/2015/06/mic2015060060", "title": "Natural Interaction with Visualization Systems", "doi": null, "abstractUrl": "/magazine/ic/2015/06/mic2015060060/13rRUxCRFSG", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/06/07018997", "title": "Query2Question: Translating Visualization Interaction into Natural Language", "doi": null, "abstractUrl": "/journal/tg/2015/06/07018997/13rRUy0HYRr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2021/2587/0/258700a220", "title": "Evaluating Natural Language Inference Models: A Metamorphic Testing Approach", "doi": null, "abstractUrl": "/proceedings-article/issre/2021/258700a220/1AUp3cpQCIg", "parentPublication": { "id": "proceedings/issre/2021/2587/0", "title": "2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09912366", "title": "Towards Natural Language-Based Visualization Authoring", "doi": null, "abstractUrl": "/journal/tg/2023/01/09912366/1HeiWkRN3tC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a006", "title": "Facilitating Conversational Interaction in Natural Language Interfaces for Visualization", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a006/1J6hcTVtKNy", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a142", "title": "Natural Language Interface for Data Visualization with Deep Learning Based Language Models", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a142/1KaH35KSrrW", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10026499", "title": "XNLI: Explaining and Diagnosing NLI-based Visual Data Analysis", "doi": null, "abstractUrl": "/journal/tg/5555/01/10026499/1KkXscJg6vm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2020/04/09118800", "title": "How to Ask What to Say?: Strategies for Evaluating Natural Language Interfaces for Data Visualization", "doi": null, "abstractUrl": "/magazine/cg/2020/04/09118800/1kHUNLgZhSM", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222342", "title": "NL4DV: A Toolkit for Generating Analytic Specifications for Data Visualization from Natural Language Queries", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222342/1nTqOo5NR3G", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09617561", "title": "Natural Language to Visualization by Neural Machine Translation", "doi": null, "abstractUrl": "/journal/tg/2022/01/09617561/1yA76vDzhhC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09716779", "articleId": "1B5WCvEX76E", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzw8iTa", "title": "Jan.-Feb.", "year": "2020", "issueNum": "01", "idPrefix": "tb", "pubType": "journal", "volume": "17", "label": "Jan.-Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUILLkCp", "doi": "10.1109/TCBB.2018.2849759", "abstract": "In recent years, the detection of epistatic interactions of multiple genetic variants on the causes of complex diseases brings a significant challenge in genome-wide association studies (GWAS). However, most of the existing methods still suffer from algorithmic limitations such as single-objective optimization, intensive computational requirement, and premature convergence. In this paper, we propose and formulate an epistatic interaction multi-objective artificial bee colony algorithm based on decomposition (EIMOABC/D) to address those problems for genetic interaction detection in genome-wide association studies. First, to direct the genetic interaction detection, two objective functions are formulated to characterize various epistatic models; rank probability model is proposed to sort each population into different nondomination levels based on the fast nondominated sorting approach. After that, the mutual information based local search algorithm is proposed to guide the population search for disease model evaluations in an unbiased manner. To validate the effectiveness of EIMOABC/D, we compare EIMOABC/D against seven state-of-the-art methods on 77 epistatic models including eight small-scale epistatic models with marginal effects, eight large-scale epistatic models with marginal effects, 60 large-scale epistatic models without any marginal effect, and one case study. The experimental results indicate that our proposed algorithm EIMOABC/D outperforms seven state-of-the-art methods on those epistatic models. Furthermore, time complexity analysis and parameter analysis are conducted to demonstrate various properties of our proposed algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years, the detection of epistatic interactions of multiple genetic variants on the causes of complex diseases brings a significant challenge in genome-wide association studies (GWAS). However, most of the existing methods still suffer from algorithmic limitations such as single-objective optimization, intensive computational requirement, and premature convergence. In this paper, we propose and formulate an epistatic interaction multi-objective artificial bee colony algorithm based on decomposition (EIMOABC/D) to address those problems for genetic interaction detection in genome-wide association studies. First, to direct the genetic interaction detection, two objective functions are formulated to characterize various epistatic models; rank probability model is proposed to sort each population into different nondomination levels based on the fast nondominated sorting approach. After that, the mutual information based local search algorithm is proposed to guide the population search for disease model evaluations in an unbiased manner. To validate the effectiveness of EIMOABC/D, we compare EIMOABC/D against seven state-of-the-art methods on 77 epistatic models including eight small-scale epistatic models with marginal effects, eight large-scale epistatic models with marginal effects, 60 large-scale epistatic models without any marginal effect, and one case study. The experimental results indicate that our proposed algorithm EIMOABC/D outperforms seven state-of-the-art methods on those epistatic models. Furthermore, time complexity analysis and parameter analysis are conducted to demonstrate various properties of our proposed algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years, the detection of epistatic interactions of multiple genetic variants on the causes of complex diseases brings a significant challenge in genome-wide association studies (GWAS). However, most of the existing methods still suffer from algorithmic limitations such as single-objective optimization, intensive computational requirement, and premature convergence. In this paper, we propose and formulate an epistatic interaction multi-objective artificial bee colony algorithm based on decomposition (EIMOABC/D) to address those problems for genetic interaction detection in genome-wide association studies. First, to direct the genetic interaction detection, two objective functions are formulated to characterize various epistatic models; rank probability model is proposed to sort each population into different nondomination levels based on the fast nondominated sorting approach. After that, the mutual information based local search algorithm is proposed to guide the population search for disease model evaluations in an unbiased manner. To validate the effectiveness of EIMOABC/D, we compare EIMOABC/D against seven state-of-the-art methods on 77 epistatic models including eight small-scale epistatic models with marginal effects, eight large-scale epistatic models with marginal effects, 60 large-scale epistatic models without any marginal effect, and one case study. The experimental results indicate that our proposed algorithm EIMOABC/D outperforms seven state-of-the-art methods on those epistatic models. Furthermore, time complexity analysis and parameter analysis are conducted to demonstrate various properties of our proposed algorithm.", "title": "Nature-Inspired Multiobjective Epistasis Elucidation from Genome-Wide Association Studies", "normalizedTitle": "Nature-Inspired Multiobjective Epistasis Elucidation from Genome-Wide Association Studies", "fno": "08392720", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Artificial Bee Colony Algorithm", "Biology Computing", "Computational Complexity", "Diseases", "Genetics", "Genomics", "Probability", "Search Problems", "Sorting", "EIMOABC D", "Epistatic Interaction Multiobjective Artificial Bee Colony Algorithm Based On Decomposition", "GWAS", "Time Complexity", "Genetic Interaction Detection", "Single Objective Optimization", "Multiple Genetic Variants", "Genome Wide Association Studies", "Nature Inspired Multiobjective Epistasis Elucidation", "Disease Model Evaluations", "Local Search Algorithm", "Rank Probability Model", "Optimization", "Linear Programming", "Diseases", "Bioinformatics", "Genomics", "Computational Modeling", "Genome Wide Association Studies", "Epistatic Interaction", "Bioinformatics", "Computational Biology" ], "authors": [ { "givenName": "Xiangtao", "surname": "Li", "fullName": "Xiangtao Li", "affiliation": "Department of Computer Science and Information Technology, Northeast Normal University, Changchun, Jilin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shixiong", "surname": "Zhang", "fullName": "Shixiong Zhang", "affiliation": "Department of Computer Science, City University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Ka-Chun", "surname": "Wong", "fullName": "Ka-Chun Wong", "affiliation": "Department of Computer Science, City University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2020-01-01 00:00:00", "pubType": "trans", "pages": "226-237", "year": "2020", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibmw/2010/8303/0/05703825", "title": "Compairing quantitative trait analysis to qualitative trait analysis for complex traits disease: A genome wide association study for hyperlipidemia", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703825/12OmNwtEECo", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2011/1612/0/06112457", "title": "A chi-square test for detecting multiple joint genetic variants in genome-wide association studies", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2011/06112457/12OmNx6g6hb", "parentPublication": { "id": "proceedings/bibmw/2011/1612/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2018/4975/0/497501a406", "title": "Computing Empirical P-Values for Estimating Gene-Gene Interactions in Genome-Wide Association Studies: A Parallel Computing Approach", "doi": null, "abstractUrl": "/proceedings-article/pdp/2018/497501a406/12OmNxj23et", "parentPublication": { "id": "proceedings/pdp/2018/4975/0", "title": "2018 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/03/07403975", "title": "Searching Genome-Wide Multi-Locus Associations for Multiple Diseases Based on Bayesian Inference", "doi": null, "abstractUrl": "/journal/tb/2017/03/07403975/13rRUxBa54H", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/02/08454302", "title": "Utilizing Deep Learning and Genome Wide Association Studies for Epistatic-Driven Preterm Birth Classification in African-American Women", "doi": null, "abstractUrl": "/journal/tb/2020/02/08454302/13rRUy3gnbV", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2016/06/07362154", "title": "Efficient and Powerful Method for Combining P-Values in Genome-Wide Association Studies", "doi": null, "abstractUrl": "/journal/tb/2016/06/07362154/13rRUyfbwph", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/04/08523629", "title": "Introducing Heuristic Information Into Ant Colony Optimization Algorithm for Identifying Epistasis", "doi": null, "abstractUrl": "/journal/tb/2020/04/08523629/17D45VTRotK", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2015/9933/0/9933a003", "title": "Efficient Secure Outsourcing of Genome-Wide Association Studies", "doi": null, "abstractUrl": "/proceedings-article/spw/2015/9933a003/17D45XERmlM", "parentPublication": { "id": "proceedings/spw/2015/9933/0", "title": "2015 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/01/09726859", "title": "IPP: An Intelligent Privacy-Preserving Scheme for Detecting Interactions in Genome Association Studies", "doi": null, "abstractUrl": "/journal/tb/2023/01/09726859/1BrwiHsTjTW", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/05/09466430", "title": "An Approach of Epistasis Detection Using Integer Linear Programming Optimizing Bayesian Network", "doi": null, "abstractUrl": "/journal/tb/2022/05/09466430/1uOtyyGeDa8", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08423114", "articleId": "13rRUwgyOhE", "__typename": "AdjacentArticleType" }, "next": { "fno": "08423163", "articleId": "13rRUyeTVgB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1i40FV6bUJi", "name": "ttb202001-08392720s1.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttb202001-08392720s1.pdf", "extension": "pdf", "size": "183 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNs5rl3s", "title": "Sept.-Oct.", "year": "2020", "issueNum": "05", "idPrefix": "mi", "pubType": "magazine", "volume": "40", "label": "Sept.-Oct.", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1lZzYVaH7lC", "doi": "10.1109/MM.2020.3013728", "abstract": "Genome analysis fundamentally starts with a process known as read mapping, where sequenced fragments of an organism's genome are compared against a reference genome. Read mapping is currently a major bottleneck in the entire genome analysis pipeline, because state-of-the-art genome sequencing technologies are able to sequence a genome much faster than the computational techniques employed to analyze the genome. We describe the ongoing journey in significantly improving the performance of read mapping. We explain state-of-the-art algorithmic methods and hardware-based acceleration approaches. Algorithmic approaches exploit the structure of the genome as well as the structure of the underlying hardware. Hardware-based acceleration approaches exploit specialized microarchitectures or various execution paradigms (e.g., processing inside or near memory). We conclude with the challenges of adopting these hardware-accelerated read mappers.", "abstracts": [ { "abstractType": "Regular", "content": "Genome analysis fundamentally starts with a process known as read mapping, where sequenced fragments of an organism's genome are compared against a reference genome. Read mapping is currently a major bottleneck in the entire genome analysis pipeline, because state-of-the-art genome sequencing technologies are able to sequence a genome much faster than the computational techniques employed to analyze the genome. We describe the ongoing journey in significantly improving the performance of read mapping. We explain state-of-the-art algorithmic methods and hardware-based acceleration approaches. Algorithmic approaches exploit the structure of the genome as well as the structure of the underlying hardware. Hardware-based acceleration approaches exploit specialized microarchitectures or various execution paradigms (e.g., processing inside or near memory). We conclude with the challenges of adopting these hardware-accelerated read mappers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Genome analysis fundamentally starts with a process known as read mapping, where sequenced fragments of an organism's genome are compared against a reference genome. Read mapping is currently a major bottleneck in the entire genome analysis pipeline, because state-of-the-art genome sequencing technologies are able to sequence a genome much faster than the computational techniques employed to analyze the genome. We describe the ongoing journey in significantly improving the performance of read mapping. We explain state-of-the-art algorithmic methods and hardware-based acceleration approaches. Algorithmic approaches exploit the structure of the genome as well as the structure of the underlying hardware. Hardware-based acceleration approaches exploit specialized microarchitectures or various execution paradigms (e.g., processing inside or near memory). We conclude with the challenges of adopting these hardware-accelerated read mappers.", "title": "Accelerating Genome Analysis: A Primer on an Ongoing Journey", "normalizedTitle": "Accelerating Genome Analysis: A Primer on an Ongoing Journey", "fno": "09154510", "hasPdf": true, "idPrefix": "mi", "keywords": [ "Biology Computing", "Genetics", "Genomics", "Molecular Biophysics", "Ongoing Journey", "Read Mapping", "Sequenced Fragments", "Organism", "Reference Genome", "Entire Genome Analysis Pipeline", "State Of The Art Genome Sequencing Technologies", "State Of The Art Algorithmic Methods", "Hardware Based Acceleration Approaches", "Hardware Accelerated Read Mappers", "Genomics", "Bioinformatics", "Indexing", "Sequential Analysis", "Memory Management" ], "authors": [ { "givenName": "Mohammed", "surname": "Alser", "fullName": "Mohammed Alser", "affiliation": "ETH Zürich", "__typename": "ArticleAuthorType" }, { "givenName": "Zülal", "surname": "Bingöl", "fullName": "Zülal Bingöl", "affiliation": "Bilkent University", "__typename": "ArticleAuthorType" }, { "givenName": "Damla Senol", "surname": "Cali", "fullName": "Damla Senol Cali", "affiliation": "Carnegie Mellon University", "__typename": "ArticleAuthorType" }, { "givenName": "Jeremie", "surname": "Kim", "fullName": "Jeremie Kim", "affiliation": "ETH Zurich and Carnegie Mellon University", "__typename": "ArticleAuthorType" }, { "givenName": "Saugata", "surname": "Ghose", "fullName": "Saugata Ghose", "affiliation": "University of Illinois at Urbana–Champaign and Carnegie Mellon University", "__typename": "ArticleAuthorType" }, { "givenName": "Can", "surname": "Alkan", "fullName": "Can Alkan", "affiliation": "Bilkent University", "__typename": "ArticleAuthorType" }, { "givenName": "Onur", "surname": "Mutlu", "fullName": "Onur Mutlu", "affiliation": "ETH Zurich, Carnegie Mellon University, and Bilkent University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2020-09-01 00:00:00", "pubType": "mags", "pages": "65-75", "year": "2020", "issn": "0272-1732", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpads/2014/7615/0/07097867", "title": "MapReduce based parallel suffix tree construction for human genome", "doi": null, "abstractUrl": "/proceedings-article/icpads/2014/07097867/12OmNAQJzQN", "parentPublication": { "id": "proceedings/icpads/2014/7615/0", "title": "2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isca/2018/5984/0/598401a069", "title": "GenAx: A Genome Sequencing Accelerator", "doi": null, "abstractUrl": "/proceedings-article/isca/2018/598401a069/12OmNAXPy7R", "parentPublication": { "id": "proceedings/isca/2018/5984/0", "title": "2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2017/0752/0/0752a814", "title": "GenServ: Genome Sequencing Services on Scalable Energy Efficient Accelerators", "doi": null, "abstractUrl": "/proceedings-article/icws/2017/0752a814/12OmNy3iFi1", "parentPublication": { "id": "proceedings/icws/2017/0752/0", "title": "2017 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2013/2081/0/2081a426", "title": "Accelerating De Bruijn Graph-Based Genome Assembly for High-Throughput Short Read Data", "doi": null, "abstractUrl": "/proceedings-article/icpads/2013/2081a426/12OmNyQGS8J", "parentPublication": { "id": "proceedings/icpads/2013/2081/0", "title": "2013 International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2017/2686/0/08109164", "title": "Accelerating Genome Sequence Alignment on Hadoop on Lustre Environment", "doi": null, "abstractUrl": "/proceedings-article/e-science/2017/08109164/12OmNzBOhAe", "parentPublication": { "id": "proceedings/e-science/2017/2686/0", "title": "2017 IEEE 13th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2015/01/06897956", "title": "Heterogeneous Cloud Framework for Big Data Genome Sequencing", "doi": null, "abstractUrl": "/journal/tb/2015/01/06897956/13rRUwgyOhy", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiswc/2018/6780/0/08573474", "title": "Gene Sequencing: Where Time Goes", "doi": null, "abstractUrl": "/proceedings-article/iiswc/2018/08573474/17D45XfSEVm", "parentPublication": { "id": "proceedings/iiswc/2018/6780/0", "title": "2018 IEEE International Symposium on Workload Characterization (IISWC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micro/2022/6272/0/627200a710", "title": "GenPIP: In-Memory Acceleration of Genome Analysis via Tight Integration of Basecalling and Read Mapping", "doi": null, "abstractUrl": "/proceedings-article/micro/2022/627200a710/1HMSEuy1cmA", "parentPublication": { "id": "proceedings/micro/2022/6272/0", "title": "2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/candarw/2022/7532/0/753200a062", "title": "Accelerating Next Generation Genome Sequencing Leveraging High Bandwidth Memory on FPGAs", "doi": null, "abstractUrl": "/proceedings-article/candarw/2022/753200a062/1LAyYMiOAN2", "parentPublication": { "id": "proceedings/candarw/2022/7532/0", "title": "2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micro/2020/7383/0/738300a951", "title": "GenASM: A High-Performance, Low-Power Approximate String Matching Acceleration Framework for Genome Sequence Analysis", "doi": null, "abstractUrl": "/proceedings-article/micro/2020/738300a951/1oFGCBpdTl6", "parentPublication": { "id": "proceedings/micro/2020/7383/0", "title": "2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09186252", "articleId": "1mP2Teof4wE", "__typename": "AdjacentArticleType" }, "next": { "fno": "09130165", "articleId": "1l59mqGwU36", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwpGgK8", "title": "Dec.", "year": "2014", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "20", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwjGoG4", "doi": "10.1109/TVCG.2014.2346441", "abstract": "Network data is ubiquitous; e-mail traffic between persons, telecommunication, transport and financial networks are some examples. Often these networks are large and multivariate, besides the topological structure of the network, multivariate data on the nodes and links is available. Currently, exploration and analysis methods are focused on a single aspect; the network topology or the multivariate data. In addition, tools and techniques are highly domain specific and require expert knowledge. We focus on the non-expert user and propose a novel solution for multivariate network exploration and analysis that tightly couples structural and multivariate analysis. In short, we go from Detail to Overview via Selections and Aggregations (DOSA): users are enabled to gain insights through the creation of selections of interest (manually or automatically), and producing high-level, infographic-style overviews simultaneously. Finally, we present example explorations on real-world datasets that demonstrate the effectiveness of our method for the exploration and understanding of multivariate networks where presentation of findings comes for free.", "abstracts": [ { "abstractType": "Regular", "content": "Network data is ubiquitous; e-mail traffic between persons, telecommunication, transport and financial networks are some examples. Often these networks are large and multivariate, besides the topological structure of the network, multivariate data on the nodes and links is available. Currently, exploration and analysis methods are focused on a single aspect; the network topology or the multivariate data. In addition, tools and techniques are highly domain specific and require expert knowledge. We focus on the non-expert user and propose a novel solution for multivariate network exploration and analysis that tightly couples structural and multivariate analysis. In short, we go from Detail to Overview via Selections and Aggregations (DOSA): users are enabled to gain insights through the creation of selections of interest (manually or automatically), and producing high-level, infographic-style overviews simultaneously. Finally, we present example explorations on real-world datasets that demonstrate the effectiveness of our method for the exploration and understanding of multivariate networks where presentation of findings comes for free.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Network data is ubiquitous; e-mail traffic between persons, telecommunication, transport and financial networks are some examples. Often these networks are large and multivariate, besides the topological structure of the network, multivariate data on the nodes and links is available. Currently, exploration and analysis methods are focused on a single aspect; the network topology or the multivariate data. In addition, tools and techniques are highly domain specific and require expert knowledge. We focus on the non-expert user and propose a novel solution for multivariate network exploration and analysis that tightly couples structural and multivariate analysis. In short, we go from Detail to Overview via Selections and Aggregations (DOSA): users are enabled to gain insights through the creation of selections of interest (manually or automatically), and producing high-level, infographic-style overviews simultaneously. Finally, we present example explorations on real-world datasets that demonstrate the effectiveness of our method for the exploration and understanding of multivariate networks where presentation of findings comes for free.", "title": "Multivariate Network Exploration and Presentation: From Detail to Overview via Selections and Aggregations", "normalizedTitle": "Multivariate Network Exploration and Presentation: From Detail to Overview via Selections and Aggregations", "fno": "06875972", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Graphical User Interfaces", "Network Theory Graphs", "Topology", "Multivariate Network Presentation", "Ubiquitous Network Data", "E Mail Traffic", "Large Multivariate Networks", "Topological Network Structure", "Network Links", "Network Nodes", "Network Topology", "Multivariate Network Exploration", "Multivariate Network Analysis", "Structural Analysis", "Multivariate Data Analysis", "Detail To Overview Via Selections And Aggregations", "DOSA Framework", "High Level Infographic Style Overviews", "Real World Datasets", "Data Visualization", "Clutter", "Network Topology", "Context Awareness", "Image Color Analysis", "Multivariate Networks", "Selections Of Interest", "Interaction", "Direct Manipulation" ], "authors": [ { "givenName": "Stef", "surname": "van den Elzen", "fullName": "Stef van den Elzen", "affiliation": "Department of Mathematic and Computer Science, Eindhoven University of Technology, The Netherlands", "__typename": "ArticleAuthorType" }, { "givenName": "Jarke J.", "surname": "van Wijk", "fullName": "Jarke J. van Wijk", "affiliation": "Department of Mathematic and Computer Science, Eindhoven University of Technology, The Netherlands", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2014-12-01 00:00:00", "pubType": "trans", "pages": "2310-2319", "year": "2014", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/1997/8262/0/82620111", "title": "Multivariate visualization using metric scaling", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1997/82620111/12OmNqOwQJt", "parentPublication": { "id": "proceedings/ieee-vis/1997/8262/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742378", "title": "Analyzing information transfer in time-varying multivariate data", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742378/12OmNvA1h6P", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019837", "title": "Exploring Multivariate Event Sequences Using Rules, Aggregations, and Selections", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019837/13rRUEgs2C1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/09/08047300", "title": "Cluster-Based Visual Abstraction for Multivariate Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2018/09/08047300/13rRUILLkvy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585619", "title": "Exploring Lekagul Sensor Events using Rules, Aggregations, and Selections", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585619/17D45VTRotf", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454344", "title": "Juniper: A Tree+Table Approach to Multivariate Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454344/17D45WLdYQV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/04/08340877", "title": "StreamStory: Exploring Multivariate Time Series on Multiple Scales", "doi": null, "abstractUrl": "/journal/tg/2019/04/08340877/17YCN4oTjd6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2022/03/09826433", "title": "Information-Theoretic Exploration of Multivariate Time-Varying Image Databases", "doi": null, "abstractUrl": "/magazine/cs/2022/03/09826433/1EVdDbjISXK", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020729", "title": "Spatio-Temporal Based Architecture Topology Search for Multivariate Time Series Prediction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020729/1KfQW8NLtLi", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2008/2935/0/04677368", "title": "Multivariate visual explanation for high dimensional datasets", "doi": null, "abstractUrl": "/proceedings-article/vast/2008/04677368/1oFGMltTtFC", "parentPublication": { "id": "proceedings/vast/2008/2935/0", "title": "2008 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06875979", "articleId": "13rRUxcbnHa", "__typename": "AdjacentArticleType" }, "next": { "fno": "06875969", "articleId": "13rRUwh80Hd", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBqMDkg", "title": "September", "year": "1996", "issueNum": "09", "idPrefix": "tp", "pubType": "journal", "volume": "18", "label": "September", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUx0xPnW", "doi": "10.1109/34.537351", "abstract": "Abstract—The morphological skeleton and morphological shape decomposition (MSD) are two popular approaches for morphological shape representation. Each method represents an object as an algebraic combination of a number of components, where each component is given by a locus of points dilated by a specified structuring-element homothetic. This correspondence develops a theoretical comparison between the two methods. Combining the theoretical results with several representation cost measures, we make a concrete comparison of the efficiency of the two methods. The results indicate that for complex objects—i.e., objects requiring a full range of homothetic sizes in the morphological skeleton representation—the MSD represents objects more efficiently than the morphological skeleton for three of four suggested cost measures.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—The morphological skeleton and morphological shape decomposition (MSD) are two popular approaches for morphological shape representation. Each method represents an object as an algebraic combination of a number of components, where each component is given by a locus of points dilated by a specified structuring-element homothetic. This correspondence develops a theoretical comparison between the two methods. Combining the theoretical results with several representation cost measures, we make a concrete comparison of the efficiency of the two methods. The results indicate that for complex objects—i.e., objects requiring a full range of homothetic sizes in the morphological skeleton representation—the MSD represents objects more efficiently than the morphological skeleton for three of four suggested cost measures.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—The morphological skeleton and morphological shape decomposition (MSD) are two popular approaches for morphological shape representation. Each method represents an object as an algebraic combination of a number of components, where each component is given by a locus of points dilated by a specified structuring-element homothetic. This correspondence develops a theoretical comparison between the two methods. Combining the theoretical results with several representation cost measures, we make a concrete comparison of the efficiency of the two methods. The results indicate that for complex objects—i.e., objects requiring a full range of homothetic sizes in the morphological skeleton representation—the MSD represents objects more efficiently than the morphological skeleton for three of four suggested cost measures.", "title": "Comparison Between the Morphological Skeleton and Morphological Shape Decomposition", "normalizedTitle": "Comparison Between the Morphological Skeleton and Morphological Shape Decomposition", "fno": "i0951", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Mathematical Morphology", "Shape Representation", "Morphological Skeleton", "Morphological Shape Decomposition", "Image Analysis", "Computer Vision", "Shape Analysis" ], "authors": [ { "givenName": "Joseph M.", "surname": "Reinhardt", "fullName": "Joseph M. Reinhardt", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "William E.", "surname": "Higgins", "fullName": "William E. Higgins", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "09", "pubDate": "1996-09-01 00:00:00", "pubType": "trans", "pages": "951-957", "year": "1996", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "i0945", "articleId": "13rRUwIF6eJ", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1ErlpBk8JBS", "doi": "10.1109/TVCG.2022.3185247", "abstract": "Point cloud shape completion plays a central role in diverse 3D vision and robotics applications. Early methods used to generate global shapes without local detail refinement. Current methods tend to leverage local features to preserve the observed geometric details. However, they usually adopt the convolutional architecture over the incomplete point cloud to extract local features to restore the diverse information of both latent shape skeleton and geometric details, where long-distance correlation among the skeleton and details is ignored. In this work, we present a coarse-to-fine completion framework, which makes full use of both neighboring and long-distance region cues for point cloud completion. Our network leverages a Skeleton-Detail Transformer, which contains cross-attention and self-attention layers, to fully explore the correlation from local patterns to global shape and utilize it to enhance the overall skeleton. Also, we propose a selective attention mechanism to save memory usage in the attention process without significantly affecting performance. We conduct extensive experiments on the ShapeNet dataset and real-scanned datasets. Qualitative and quantitative evaluations demonstrate that our proposed network outperforms current state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "Point cloud shape completion plays a central role in diverse 3D vision and robotics applications. Early methods used to generate global shapes without local detail refinement. Current methods tend to leverage local features to preserve the observed geometric details. However, they usually adopt the convolutional architecture over the incomplete point cloud to extract local features to restore the diverse information of both latent shape skeleton and geometric details, where long-distance correlation among the skeleton and details is ignored. In this work, we present a coarse-to-fine completion framework, which makes full use of both neighboring and long-distance region cues for point cloud completion. Our network leverages a Skeleton-Detail Transformer, which contains cross-attention and self-attention layers, to fully explore the correlation from local patterns to global shape and utilize it to enhance the overall skeleton. Also, we propose a selective attention mechanism to save memory usage in the attention process without significantly affecting performance. We conduct extensive experiments on the ShapeNet dataset and real-scanned datasets. Qualitative and quantitative evaluations demonstrate that our proposed network outperforms current state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Point cloud shape completion plays a central role in diverse 3D vision and robotics applications. Early methods used to generate global shapes without local detail refinement. Current methods tend to leverage local features to preserve the observed geometric details. However, they usually adopt the convolutional architecture over the incomplete point cloud to extract local features to restore the diverse information of both latent shape skeleton and geometric details, where long-distance correlation among the skeleton and details is ignored. In this work, we present a coarse-to-fine completion framework, which makes full use of both neighboring and long-distance region cues for point cloud completion. Our network leverages a Skeleton-Detail Transformer, which contains cross-attention and self-attention layers, to fully explore the correlation from local patterns to global shape and utilize it to enhance the overall skeleton. Also, we propose a selective attention mechanism to save memory usage in the attention process without significantly affecting performance. We conduct extensive experiments on the ShapeNet dataset and real-scanned datasets. Qualitative and quantitative evaluations demonstrate that our proposed network outperforms current state-of-the-art methods.", "title": "Point Cloud Completion Via Skeleton-Detail Transformer", "normalizedTitle": "Point Cloud Completion Via Skeleton-Detail Transformer", "fno": "09804851", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Skeleton", "Shape", "Transformers", "Point Cloud Compression", "Three Dimensional Displays", "Correlation", "Task Analysis", "Point Cloud", "Point Cloud Completion", "Shape Completion" ], "authors": [ { "givenName": "Wenxiao", "surname": "Zhang", "fullName": "Wenxiao Zhang", "affiliation": "School of Computer Science, Wuhan University, Wuhan, Hubei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Huajian", "surname": "zhou", "fullName": "Huajian zhou", "affiliation": "School of Computer Science, Wuhan University, Wuhan, Hubei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhen", "surname": "Dong", "fullName": "Zhen Dong", "affiliation": "State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jun", "surname": "Liu", "fullName": "Jun Liu", "affiliation": "Singapore University of Technology and Design, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Qingan", "surname": "Yan", "fullName": "Qingan Yan", "affiliation": "InnoPeak Technology, Inc. 2479 E Bayshore Rd, Palo Alto, CA", "__typename": "ArticleAuthorType" }, { "givenName": "Chunxia", "surname": "Xiao", "fullName": "Chunxia Xiao", "affiliation": "School of Computer Science, Wuhan University, Wuhan, Hubei, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-06-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tp/2023/01/09735342", "title": "PMP-Net++: Point Cloud Completion by Transformer-Enhanced Multi-Step Point Moving Paths", "doi": null, "abstractUrl": "/journal/tp/2023/01/09735342/1BLmVZBJX6o", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200f479", "title": "SnowflakeNet: Point Cloud Completion by Snowflake Point Deconvolution with Skip-Transformer", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200f479/1BmL45zCYda", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859781", "title": "Hierarchical Graph Convolutional Skeleton Transformer for Action Recognition", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859781/1G9DN3HTea4", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859772", "title": "LGP-Net: Local Geometry Preserving Network for Point Cloud Completion", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859772/1G9EQKPLOpO", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600b716", "title": "LAKe-Net: Topology-Aware Point Cloud Completion by Localizing Aligned Keypoints", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600b716/1H0Kwo5tABi", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09928787", "title": "Snowflake Point Deconvolution for Point Cloud Completion and Generation With Skip-Transformer", "doi": null, "abstractUrl": "/journal/tp/2023/05/09928787/1HL9mk8rEKk", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10015045", "title": "CSDN: Cross-Modal Shape-Transfer Dual-Refinement Network for Point Cloud Completion", "doi": null, "abstractUrl": "/journal/tg/5555/01/10015045/1JR6dVW7wJi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscsic/2022/5488/0/548800a159", "title": "MLFT-Net: Point Cloud Completion Using Multi-Level Feature Transformer", "doi": null, "abstractUrl": "/proceedings-article/iscsic/2022/548800a159/1LvAmC051qo", "parentPublication": { "id": "proceedings/iscsic/2022/5488/0", "title": "2022 6th International Symposium on Computer Science and Intelligent Control (ISCSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10106495", "title": "Variational Relational Point Completion Network for Robust 3D Classification", "doi": null, "abstractUrl": "/journal/tp/5555/01/10106495/1MwAn9y4Ozu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900i520", "title": "Variational Relational Point Completion Network", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900i520/1yeLNkSQJX2", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09802694", "articleId": "1Eo1x2xfhYs", "__typename": "AdjacentArticleType" }, "next": { "fno": "09806341", "articleId": "1Et0iwB480M", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1J9y2mtpt3a", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1H1ggvuBvMc", "doi": "10.1109/TVCG.2022.3209449", "abstract": "A plethora of dimensionality reduction techniques have emerged over the past decades, leaving researchers and analysts with a wide variety of choices for reducing their data, all the more so given some techniques come with additional hyper-parametrization (e.g., t-SNE, UMAP, etc.). Recent studies are showing that people often use dimensionality reduction as a black-box regardless of the specific properties the method itself preserves. Hence, evaluating and comparing 2D embeddings is usually qualitatively decided, by setting embeddings side-by-side and letting human judgment decide which embedding is the best. In this work, we propose a quantitative way of evaluating embeddings, that nonetheless places human perception at the center. We run a comparative study, where we ask people to select &#x201C;good&#x201D; and &#x201C;misleading&#x201D; views between scatterplots of low-dimensional embeddings of image datasets, simulating the way people usually select embeddings. We use the study data as labels for a set of quality metrics for a supervised machine learning model whose purpose is to discover and quantify what exactly people are looking for when deciding between embeddings. With the model as a proxy for human judgments, we use it to rank embeddings on new datasets, explain why they are relevant, and quantify the degree of subjectivity when people select preferred embeddings.", "abstracts": [ { "abstractType": "Regular", "content": "A plethora of dimensionality reduction techniques have emerged over the past decades, leaving researchers and analysts with a wide variety of choices for reducing their data, all the more so given some techniques come with additional hyper-parametrization (e.g., t-SNE, UMAP, etc.). Recent studies are showing that people often use dimensionality reduction as a black-box regardless of the specific properties the method itself preserves. Hence, evaluating and comparing 2D embeddings is usually qualitatively decided, by setting embeddings side-by-side and letting human judgment decide which embedding is the best. In this work, we propose a quantitative way of evaluating embeddings, that nonetheless places human perception at the center. We run a comparative study, where we ask people to select &#x201C;good&#x201D; and &#x201C;misleading&#x201D; views between scatterplots of low-dimensional embeddings of image datasets, simulating the way people usually select embeddings. We use the study data as labels for a set of quality metrics for a supervised machine learning model whose purpose is to discover and quantify what exactly people are looking for when deciding between embeddings. With the model as a proxy for human judgments, we use it to rank embeddings on new datasets, explain why they are relevant, and quantify the degree of subjectivity when people select preferred embeddings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A plethora of dimensionality reduction techniques have emerged over the past decades, leaving researchers and analysts with a wide variety of choices for reducing their data, all the more so given some techniques come with additional hyper-parametrization (e.g., t-SNE, UMAP, etc.). Recent studies are showing that people often use dimensionality reduction as a black-box regardless of the specific properties the method itself preserves. Hence, evaluating and comparing 2D embeddings is usually qualitatively decided, by setting embeddings side-by-side and letting human judgment decide which embedding is the best. In this work, we propose a quantitative way of evaluating embeddings, that nonetheless places human perception at the center. We run a comparative study, where we ask people to select “good” and “misleading” views between scatterplots of low-dimensional embeddings of image datasets, simulating the way people usually select embeddings. We use the study data as labels for a set of quality metrics for a supervised machine learning model whose purpose is to discover and quantify what exactly people are looking for when deciding between embeddings. With the model as a proxy for human judgments, we use it to rank embeddings on new datasets, explain why they are relevant, and quantify the degree of subjectivity when people select preferred embeddings.", "title": "Predicting User Preferences of Dimensionality Reduction Embedding Quality", "normalizedTitle": "Predicting User Preferences of Dimensionality Reduction Embedding Quality", "fno": "09904619", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Reduction", "Human Factors", "Supervised Learning", "2 D Embeddings", "Dimensionality Reduction Embedding Quality", "Human Judgment", "Human Perception", "Hyper Parametrization", "Image Datasets", "Low Dimensional Embeddings", "Quality Metrics", "Supervised Machine Learning", "User Preference Prediction", "Measurement", "Task Analysis", "Data Visualization", "Computational Modeling", "Visualization", "Supervised Learning", "Principal Component Analysis", "Dimensionality Reduction", "Manifold Learning", "Human Centered Computing" ], "authors": [ { "givenName": "Cristina", "surname": "Morariu", "fullName": "Cristina Morariu", "affiliation": "University of Stuttgart, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Adrien", "surname": "Bibal", "fullName": "Adrien Bibal", "affiliation": "Université catholique de Louvain, Belgium", "__typename": "ArticleAuthorType" }, { "givenName": "Rene", "surname": "Cutura", "fullName": "Rene Cutura", "affiliation": "University of Stuttgart, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Benoît", "surname": "Frénay", "fullName": "Benoît Frénay", "affiliation": "University of Namur, Belgium", "__typename": "ArticleAuthorType" }, { "givenName": "Michael", "surname": "Sedlmair", "fullName": "Michael Sedlmair", "affiliation": "University of Stuttgart, Germany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "745-755", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2011/289/1/05750570", "title": "Face Recognition by LLE Dimensionality Reduction", "doi": null, "abstractUrl": "/proceedings-article/icicta/2011/05750570/12OmNBDyA6d", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-euc/2013/5088/0/06831939", "title": "A Robust Dimensionality Reduction Method from Laplacian Orientations", "doi": null, "abstractUrl": "/proceedings-article/hpcc-euc/2013/06831939/12OmNzFMFpX", "parentPublication": { "id": "proceedings/hpcc-euc/2013/5088/0", "title": "2013 IEEE International Conference on High Performance Computing and Communications (HPCC) & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2012/5638/0/06406304", "title": "Dimensionality Reduction for Emotional Speech Recognition", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2012/06406304/12OmNzSQdrs", "parentPublication": { "id": "proceedings/passat-socialcom/2012/5638/0", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2004/04/v0459", "title": "Robust Linear Dimensionality Reduction", "doi": null, "abstractUrl": "/journal/tg/2004/04/v0459/13rRUxBJhFl", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2007/01/04016549", "title": "Graph Embedding and Extensions: A General Framework for Dimensionality Reduction", "doi": null, "abstractUrl": "/journal/tp/2007/01/04016549/13rRUxEhFtN", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/01/08226989", "title": "Probabilistic Dimensionality Reduction via Structure Learning", "doi": null, "abstractUrl": "/journal/tp/2019/01/08226989/17D45XDIXQx", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2019/5686/0/568600a577", "title": "Autoencoder Based Dimensionality Reduction of Feature Vectors for Object Recognition", "doi": null, "abstractUrl": "/proceedings-article/sitis/2019/568600a577/1j9xB188lAk", "parentPublication": { "id": "proceedings/sitis/2019/5686/0", "title": "2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09543512", "title": "Unsupervised Dimensionality Reduction Based on Fusing Multiple Clustering Results", "doi": null, "abstractUrl": "/journal/tk/2023/03/09543512/1x4UGJ56Qpy", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09555244", "title": "Interactive Dimensionality Reduction for Comparative Analysis", "doi": null, "abstractUrl": "/journal/tg/2022/01/09555244/1xjR1QZtkTS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09609642", "title": "Constrained Generative Adversarial Learning for Dimensionality Reduction", "doi": null, "abstractUrl": "/journal/tk/2023/03/09609642/1yoxyIQPsqs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09904480", "articleId": "1H0GkV5P1qo", "__typename": "AdjacentArticleType" }, "next": { "fno": "09912359", "articleId": "1HeiT0PQBWg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1J9yDC9a4YE", "name": "ttg202301-09904619s1-supp1-3209449.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202301-09904619s1-supp1-3209449.pdf", "extension": "pdf", "size": "5.89 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1qdSTDvknHa", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tp", "pubType": "journal", "volume": "43", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1cG4oumJbna", "doi": "10.1109/TPAMI.2019.2935715", "abstract": "Visual saliency models have enjoyed a big leap in performance in recent years, thanks to advances in deep learning and large scale annotated data. Despite enormous effort and huge breakthroughs, however, models still fall short in reaching human-level accuracy. In this work, I explore the landscape of the field emphasizing on new deep saliency models, benchmarks, and datasets. A large number of image and video saliency models are reviewed and compared over two image benchmarks and two large scale video datasets. Further, I identify factors that contribute to the gap between models and humans and discuss the remaining issues that need to be addressed to build the next generation of more powerful saliency models. Some specific questions that are addressed include: in what ways current models fail, how to remedy them, what can be learned from cognitive studies of attention, how explicit saliency judgments relate to fixations, how to conduct fair model comparison, and what are the emerging applications of saliency models.", "abstracts": [ { "abstractType": "Regular", "content": "Visual saliency models have enjoyed a big leap in performance in recent years, thanks to advances in deep learning and large scale annotated data. Despite enormous effort and huge breakthroughs, however, models still fall short in reaching human-level accuracy. In this work, I explore the landscape of the field emphasizing on new deep saliency models, benchmarks, and datasets. A large number of image and video saliency models are reviewed and compared over two image benchmarks and two large scale video datasets. Further, I identify factors that contribute to the gap between models and humans and discuss the remaining issues that need to be addressed to build the next generation of more powerful saliency models. Some specific questions that are addressed include: in what ways current models fail, how to remedy them, what can be learned from cognitive studies of attention, how explicit saliency judgments relate to fixations, how to conduct fair model comparison, and what are the emerging applications of saliency models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visual saliency models have enjoyed a big leap in performance in recent years, thanks to advances in deep learning and large scale annotated data. Despite enormous effort and huge breakthroughs, however, models still fall short in reaching human-level accuracy. In this work, I explore the landscape of the field emphasizing on new deep saliency models, benchmarks, and datasets. A large number of image and video saliency models are reviewed and compared over two image benchmarks and two large scale video datasets. Further, I identify factors that contribute to the gap between models and humans and discuss the remaining issues that need to be addressed to build the next generation of more powerful saliency models. Some specific questions that are addressed include: in what ways current models fail, how to remedy them, what can be learned from cognitive studies of attention, how explicit saliency judgments relate to fixations, how to conduct fair model comparison, and what are the emerging applications of saliency models.", "title": "Saliency Prediction in the Deep Learning Era: Successes and Limitations", "normalizedTitle": "Saliency Prediction in the Deep Learning Era: Successes and Limitations", "fno": "08805409", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Cognition", "Learning Artificial Intelligence", "Video Signal Processing", "Explicit Saliency Judgments", "Fair Model Comparison", "Saliency Prediction", "Deep Learning Era", "Visual Saliency Models", "Big Leap", "Enormous Effort", "Huge Breakthroughs", "Human Level Accuracy", "Deep Saliency Models", "Video Saliency Models", "Image Benchmarks", "Video Datasets", "Powerful Saliency Models", "Predictive Models", "Computational Modeling", "Benchmark Testing", "Data Models", "Visualization", "Deep Learning", "Task Analysis", "Visual Saliency", "Eye Movement Prediction", "Attention", "Video Saliency", "Benchmark", "Deep Learning" ], "authors": [ { "givenName": "Ali", "surname": "Borji", "fullName": "Ali Borji", "affiliation": "MarkableAI Inc, Brooklyn, NY, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "679-700", "year": "2021", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2014/5118/0/5118c798", "title": "Large-Scale Optimization of Hierarchical Features for Saliency Prediction in Natural Images", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118c798/12OmNC8dgmP", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851a516", "title": "A Deeper Look at Saliency: Feature Contrast, Semantics, and Beyond", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851a516/12OmNx38vV2", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391a190", "title": "A Data-Driven Metric for Comprehensive Evaluation of Saliency Models", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391a190/12OmNxeut3i", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2018/4886/0/488601b529", "title": "Saliency Prediction for Mobile User Interfaces", "doi": null, "abstractUrl": "/proceedings-article/wacv/2018/488601b529/12OmNzdGnsJ", "parentPublication": { "id": "proceedings/wacv/2018/4886/0", "title": "2018 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09802782", "title": "Towards Gradient-based Saliency Consensus Training for Adversarial Robustness", "doi": null, "abstractUrl": "/journal/tq/5555/01/09802782/1Eo1B75Z4ru", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600c050", "title": "TinyHD: Efficient Video Saliency Prediction with Heterogeneous Decoders using Hierarchical Maps Distillation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600c050/1L6LF4723q8", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/01/08744328", "title": "Revisiting Video Saliency Prediction in the Deep Learning Era", "doi": null, "abstractUrl": "/journal/tp/2021/01/08744328/1bYPA2ONQT6", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800e472", "title": "How Much Time Do You Have? Modeling Multi-Duration Saliency", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800e472/1m3njRPpHdC", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/06/09320524", "title": "Salient Object Detection in the Deep Learning Era: An In-Depth Survey", "doi": null, "abstractUrl": "/journal/tp/2022/06/09320524/1qkwBAX9bMc", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100d743", "title": "Simple baselines can fool 360&#x00B0; saliency metrics", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100d743/1yNiDufgtWg", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08784215", "articleId": "1c8N1E8TUQ0", "__typename": "AdjacentArticleType" }, "next": { "fno": "08781904", "articleId": "1c5tfe1vTmU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qdT12qa7W8", "name": "ttp202102-08805409s1-supp.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202102-08805409s1-supp.pdf", "extension": "pdf", "size": "6.66 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwIYZyo", "title": "November", "year": "2002", "issueNum": "11", "idPrefix": "tp", "pubType": "journal", "volume": "24", "label": "November", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwInvBV", "doi": "10.1109/TPAMI.2002.1046166", "abstract": "Abstract—We propose an approach for matching distorted and possibly occluded shapes using Dynamic Programming (DP). We distinguish among various cases of matching such as cases where the shapes are scaled with respect to each other and cases where an open shape matches the whole or only a part of another open or closed shape. Our algorithm treats noise and shape distortions by allowing matching of merged sequences of consecutive small segments in a shape with larger segments of another shape, while being invariant to translation, scale, orientation, and starting point selection. We illustrate the effectiveness of our algorithm in retrieval of shapes on two data sets of two-dimensional open and closed shapes of marine life species. We demonstrate the superiority of our approach over traditional approaches to shape matching and retrieval based on Fourier descriptors and moments. We also compare our method with SQUID, a well-known method which is available on the Internet. Our evaluation is based on human relevance judgments following a well-established methodology from the information retrieval field.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—We propose an approach for matching distorted and possibly occluded shapes using Dynamic Programming (DP). We distinguish among various cases of matching such as cases where the shapes are scaled with respect to each other and cases where an open shape matches the whole or only a part of another open or closed shape. Our algorithm treats noise and shape distortions by allowing matching of merged sequences of consecutive small segments in a shape with larger segments of another shape, while being invariant to translation, scale, orientation, and starting point selection. We illustrate the effectiveness of our algorithm in retrieval of shapes on two data sets of two-dimensional open and closed shapes of marine life species. We demonstrate the superiority of our approach over traditional approaches to shape matching and retrieval based on Fourier descriptors and moments. We also compare our method with SQUID, a well-known method which is available on the Internet. Our evaluation is based on human relevance judgments following a well-established methodology from the information retrieval field.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—We propose an approach for matching distorted and possibly occluded shapes using Dynamic Programming (DP). We distinguish among various cases of matching such as cases where the shapes are scaled with respect to each other and cases where an open shape matches the whole or only a part of another open or closed shape. Our algorithm treats noise and shape distortions by allowing matching of merged sequences of consecutive small segments in a shape with larger segments of another shape, while being invariant to translation, scale, orientation, and starting point selection. We illustrate the effectiveness of our algorithm in retrieval of shapes on two data sets of two-dimensional open and closed shapes of marine life species. We demonstrate the superiority of our approach over traditional approaches to shape matching and retrieval based on Fourier descriptors and moments. We also compare our method with SQUID, a well-known method which is available on the Internet. Our evaluation is based on human relevance judgments following a well-established methodology from the information retrieval field.", "title": "Matching and Retrieval of Distorted and Occluded Shapes Using Dynamic Programming", "normalizedTitle": "Matching and Retrieval of Distorted and Occluded Shapes Using Dynamic Programming", "fno": "i1501", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Image Database", "Shape Retrieval", "Query By Example", "Dynamic Programming", "Relevance Judgments" ], "authors": [ { "givenName": "Euripides G.M.", "surname": "Petrakis", "fullName": "Euripides G.M. Petrakis", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Aristeidis", "surname": "Diplaros", "fullName": "Aristeidis Diplaros", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Evangelos", "surname": "Milios", "fullName": "Evangelos Milios", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "11", "pubDate": "2002-11-01 00:00:00", "pubType": "trans", "pages": "1501-1516", "year": "2002", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "i1485", "articleId": "13rRUxC0SPu", "__typename": "AdjacentArticleType" }, "next": { "fno": "i1517", "articleId": "13rRUyuegi5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNCcKQnz", "title": "Sept.-Oct.", "year": "2012", "issueNum": "05", "idPrefix": "ic", "pubType": "magazine", "volume": "16", "label": "Sept.-Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUILLkA1", "doi": "10.1109/MIC.2012.68", "abstract": "Although microtask platforms are desirable for their speed, scalability, and low cost, task performance varies greatly. Many researchers have focused on improving the quality of the work performed on such platforms. Priming uses implicit mechanisms to induce observable changes in behavior. Although priming has been effective in the laboratory, its use hasn't been explored extensively in software design, perhaps because the effects are often short-lived. In the context of microtask crowdsourcing environments, however, where tasks are short and circumscribed, temporary priming effects can lead to significant performance gains.", "abstracts": [ { "abstractType": "Regular", "content": "Although microtask platforms are desirable for their speed, scalability, and low cost, task performance varies greatly. Many researchers have focused on improving the quality of the work performed on such platforms. Priming uses implicit mechanisms to induce observable changes in behavior. Although priming has been effective in the laboratory, its use hasn't been explored extensively in software design, perhaps because the effects are often short-lived. In the context of microtask crowdsourcing environments, however, where tasks are short and circumscribed, temporary priming effects can lead to significant performance gains.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Although microtask platforms are desirable for their speed, scalability, and low cost, task performance varies greatly. Many researchers have focused on improving the quality of the work performed on such platforms. Priming uses implicit mechanisms to induce observable changes in behavior. Although priming has been effective in the laboratory, its use hasn't been explored extensively in software design, perhaps because the effects are often short-lived. In the context of microtask crowdsourcing environments, however, where tasks are short and circumscribed, temporary priming effects can lead to significant performance gains.", "title": "Priming for Better Performance in Microtask Crowdsourcing Environments", "normalizedTitle": "Priming for Better Performance in Microtask Crowdsourcing Environments", "fno": "mic2012050013", "hasPdf": true, "idPrefix": "ic", "keywords": [ "Internet", "Context", "Problem Solving", "Laboratories", "Scalability", "Mood", "TV", "Priming", "Crowdsourcing", "Emotion" ], "authors": [ { "givenName": "Robert R.", "surname": "Morris", "fullName": "Robert R. Morris", "affiliation": "Massachusetts Institute of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Mira", "surname": "Dontcheva", "fullName": "Mira Dontcheva", "affiliation": "Advanced Technology Labs, Adobe", "__typename": "ArticleAuthorType" }, { "givenName": "Elizabeth M.", "surname": "Gerber", "fullName": "Elizabeth M. Gerber", "affiliation": "Northwestern University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2012-09-01 00:00:00", "pubType": "mags", "pages": "13-19", "year": "2012", "issn": "1089-7801", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2013/4892/0/4892a215", "title": "Creative Virtual Environments: Effect of Supraliminal Priming on Team Brainstorming", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892a215/12OmNANkooi", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2016/2675/0/2675a001", "title": "CrowdRec: Trust-Aware Worker Recommendation in Crowdsourcing Environments", "doi": null, "abstractUrl": "/proceedings-article/icws/2016/2675a001/12OmNB836TN", "parentPublication": { "id": "proceedings/icws/2016/2675/0", "title": "2016 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2016/6167/0/07838231", "title": "Bee Colony Based Worker Reliability Estimation Algorithm in Microtask Crowdsourcing", "doi": null, "abstractUrl": "/proceedings-article/icmla/2016/07838231/12OmNzVXNWo", "parentPublication": { "id": "proceedings/icmla/2016/6167/0", "title": "2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csi-se/2016/4158/0/4158a041", "title": "Toward Microtask Crowdsourcing Software Design Work", "doi": null, "abstractUrl": "/proceedings-article/csi-se/2016/4158a041/12OmNzhELig", "parentPublication": { "id": "proceedings/csi-se/2016/4158/0", "title": "2016 IEEE/ACM 3rd International Workshop on CrowdSourcing in Software Engineering (CSI-SE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2013/5048/0/5048a067", "title": "Affect and Creative Performance on Crowdsourcing Platforms", "doi": null, "abstractUrl": "/proceedings-article/acii/2013/5048a067/12OmNzvQHM4", "parentPublication": { "id": "proceedings/acii/2013/5048/0", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09672079", "title": "A Skill-based Worksharing Approach for Microtask Assignment", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09672079/1A8iWq40rNS", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2022/5963/0/596300a144", "title": "A/B Testing for Better Instruction of Crowdsourcing using Real and Virtual Workers", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2022/596300a144/1JvaK7iaRIk", "parentPublication": { "id": "proceedings/bigmm/2022/5963/0", "title": "2022 IEEE Eighth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020590", "title": "PostMe: Unsupervised Dynamic Microtask Posting For Efficient and Reliable Crowdsourcing", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020590/1KfSds29jO0", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2019/3888/0/08925466", "title": "Unintentional affective priming during labeling may bias labels", "doi": null, "abstractUrl": "/proceedings-article/acii/2019/08925466/1fHGBfUYXkY", "parentPublication": { "id": "proceedings/acii/2019/3888/0", "title": "2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/services/2020/8203/0/820300a134", "title": "New Task Oriented Recommendation method Based on Hungarian algorithm in Crowdsourcing Platform", "doi": null, "abstractUrl": "/proceedings-article/services/2020/820300a134/1pK4Nef5AK4", "parentPublication": { "id": "proceedings/services/2020/8203/0", "title": "2020 IEEE World Congress on Services (SERVICES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mic2012050010", "articleId": "13rRUxcsYQD", "__typename": "AdjacentArticleType" }, "next": { "fno": "mic2012050020", "articleId": "13rRUy2YLML", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyeWdDd", "title": "Feb.", "year": "2015", "issueNum": "02", "idPrefix": "tk", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwbs2bs", "doi": "10.1109/TKDE.2014.2327028", "abstract": "The large number of potential applications from bridging web data with knowledge bases have led to an increase in the entity linking research. Entity linking is the task to link entity mentions in text with their corresponding entities in a knowledge base. Potential applications include information extraction, information retrieval, and knowledge base population. However, this task is challenging due to name variations and entity ambiguity. In this survey, we present a thorough overview and analysis of the main approaches to entity linking, and discuss various applications, the evaluation of entity linking systems, and future directions.", "abstracts": [ { "abstractType": "Regular", "content": "The large number of potential applications from bridging web data with knowledge bases have led to an increase in the entity linking research. Entity linking is the task to link entity mentions in text with their corresponding entities in a knowledge base. Potential applications include information extraction, information retrieval, and knowledge base population. However, this task is challenging due to name variations and entity ambiguity. In this survey, we present a thorough overview and analysis of the main approaches to entity linking, and discuss various applications, the evaluation of entity linking systems, and future directions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The large number of potential applications from bridging web data with knowledge bases have led to an increase in the entity linking research. Entity linking is the task to link entity mentions in text with their corresponding entities in a knowledge base. Potential applications include information extraction, information retrieval, and knowledge base population. However, this task is challenging due to name variations and entity ambiguity. In this survey, we present a thorough overview and analysis of the main approaches to entity linking, and discuss various applications, the evaluation of entity linking systems, and future directions.", "title": "Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions", "normalizedTitle": "Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions", "fno": "06823700", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Joining Processes", "Knowledge Based Systems", "Encyclopedias", "Internet", "Electronic Publishing", "Couplings", "Knowledge Base", "Entity Linking", "Entity Disambiguation" ], "authors": [ { "givenName": "Wei", "surname": "Shen", "fullName": "Wei Shen", "affiliation": "College of Computer and Control Engineering, Nankai University, Tianjin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jianyong", "surname": "Wang", "fullName": "Jianyong Wang", "affiliation": "Department of Computer Science and Technology, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiawei", "surname": "Han", "fullName": "Jiawei Han", "affiliation": "Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2015-02-01 00:00:00", "pubType": "trans", "pages": "443-460", "year": "2015", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2015/8391/0/8391e615", "title": "Semantic Video Entity Linking Based on Visual Content and Metadata", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391e615/12OmNqG0SQI", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2014/7100/0/07073240", "title": "Graph based tweet entity linking using DBpedia", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2014/07073240/12OmNvkGW1H", "parentPublication": { "id": "proceedings/aiccsa/2014/7100/0", "title": "2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2013/5062/0/06657131", "title": "Semantic Linking and Contextualization for Social Forensic Text Analysis", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657131/12OmNvrMUh8", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2014/5877/0/06921648", "title": "Populating knowledge base with collective entity mentions: A graph-based approach", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921648/12OmNyeWdMz", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2017/3876/0/387601a285", "title": "Personalized EntityRank-Based Entity Linking with DBpedia", "doi": null, "abstractUrl": "/proceedings-article/ictai/2017/387601a285/12OmNyywxEN", "parentPublication": { "id": "proceedings/ictai/2017/3876/0", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/02/08063926", "title": "THINKER - Entity Linking System for Turkish Language", "doi": null, "abstractUrl": "/journal/tk/2018/02/08063926/13rRUEgarog", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/02/07990163", "title": "SHINE+: A General Framework for Domain-Specific Entity Linking with Heterogeneous Information Networks", "doi": null, "abstractUrl": "/journal/tk/2018/02/07990163/13rRUwbs2gP", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/07/08413112", "title": "Pair-Linking for Collective Entity Disambiguation: Two Could Be Better Than All", "doi": null, "abstractUrl": "/journal/tk/2019/07/08413112/13rRUypp58c", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cipae/2022/6812/0/681200a276", "title": "An entity linking method based on graph feature and electricity domain knowledge base", "doi": null, "abstractUrl": "/proceedings-article/cipae/2022/681200a276/1KExRM73rag", "parentPublication": { "id": "proceedings/cipae/2022/6812/0", "title": "2022 International Conference on Computers, Information Processing and Advanced Education (CIPAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/12/09384305", "title": "Toward Tweet Entity Linking With Heterogeneous Information Networks", "doi": null, "abstractUrl": "/journal/tk/2022/12/09384305/1scDm0PuYQU", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06834772", "articleId": "13rRUxjyX4x", "__typename": "AdjacentArticleType" }, "next": { "fno": "06709813", "articleId": "13rRUxCityG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNCaLEju", "title": "Jan.", "year": "2018", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "24", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwkfAZl", "doi": "10.1109/TVCG.2017.2746018", "abstract": "In this paper we present a set of four user studies aimed at exploring the visual design space of what we call keyword summaries: lists of words with associated quantitative values used to help people derive an intuition of what information a given document collection (or part of it) may contain. We seek to systematically study how different visual representations may affect people's performance in extracting information out of keyword summaries. To this purpose, we first create a design space of possible visual representations and compare the possible solutions in this design space through a variety of representative tasks and performance metrics. Other researchers have, in the past, studied some aspects of effectiveness with word clouds, however, the existing literature is somewhat scattered and do not seem to address the problem in a sufficiently systematic and holistic manner. The results of our studies showed a strong dependency on the tasks users are performing. In this paper we present details of our methodology, the results, as well as, guidelines on how to design effective keyword summaries based in our discoveries.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we present a set of four user studies aimed at exploring the visual design space of what we call keyword summaries: lists of words with associated quantitative values used to help people derive an intuition of what information a given document collection (or part of it) may contain. We seek to systematically study how different visual representations may affect people's performance in extracting information out of keyword summaries. To this purpose, we first create a design space of possible visual representations and compare the possible solutions in this design space through a variety of representative tasks and performance metrics. Other researchers have, in the past, studied some aspects of effectiveness with word clouds, however, the existing literature is somewhat scattered and do not seem to address the problem in a sufficiently systematic and holistic manner. The results of our studies showed a strong dependency on the tasks users are performing. In this paper we present details of our methodology, the results, as well as, guidelines on how to design effective keyword summaries based in our discoveries.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we present a set of four user studies aimed at exploring the visual design space of what we call keyword summaries: lists of words with associated quantitative values used to help people derive an intuition of what information a given document collection (or part of it) may contain. We seek to systematically study how different visual representations may affect people's performance in extracting information out of keyword summaries. To this purpose, we first create a design space of possible visual representations and compare the possible solutions in this design space through a variety of representative tasks and performance metrics. Other researchers have, in the past, studied some aspects of effectiveness with word clouds, however, the existing literature is somewhat scattered and do not seem to address the problem in a sufficiently systematic and holistic manner. The results of our studies showed a strong dependency on the tasks users are performing. In this paper we present details of our methodology, the results, as well as, guidelines on how to design effective keyword summaries based in our discoveries.", "title": "Taking Word Clouds Apart: An Empirical Investigation of the Design Space for Keyword Summaries", "normalizedTitle": "Taking Word Clouds Apart: An Empirical Investigation of the Design Space for Keyword Summaries", "fno": "08017641", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Tag Clouds", "Visualization", "Layout", "Extraterrestrial Measurements", "Encoding", "Data Mining", "Systematics", "Word Clouds", "Tag Clouds", "Text Visualization", "Keyword Summaries" ], "authors": [ { "givenName": "Cristian", "surname": "Felix", "fullName": "Cristian Felix", "affiliation": "New York University", "__typename": "ArticleAuthorType" }, { "givenName": "Steven", "surname": "Franconeri", "fullName": "Steven Franconeri", "affiliation": "Northwestern University", "__typename": "ArticleAuthorType" }, { "givenName": "Enrico", "surname": "Bertini", "fullName": "Enrico Bertini", "affiliation": "New York University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2018-01-01 00:00:00", "pubType": "trans", "pages": "657-666", "year": "2018", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/gcis/2009/3571/3/3571c554", "title": "Manifold-Based Combination of Visual Features and Keyword Features for Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/gcis/2009/3571c554/12OmNAgY7np", "parentPublication": { "id": "proceedings/gcis/2009/3571/3", "title": "2009 WRI Global Congress on Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2008/2161/0/04498381", "title": "Automated generation of object summaries from relational databases: A novel keyword searching paradigm", "doi": null, "abstractUrl": "/proceedings-article/icdew/2008/04498381/12OmNBBQZsw", "parentPublication": { "id": "proceedings/icdew/2008/2161/0", "title": "2008 IEEE 24th International Conference on Data Engineering Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2013/5099/0/5099a091", "title": "MIST: Multiscale Information and Summaries of Texts", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2013/5099a091/12OmNBSjJ6V", "parentPublication": { "id": "proceedings/sibgrapi/2013/5099/0", "title": "2013 XXVI Conference on Graphics, Patterns and Images", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2015/7278/0/07207297", "title": "Supporting Data Driven Access through Automatic Keyword Extraction and Summarization", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2015/07207297/12OmNwlqhJy", "parentPublication": { "id": "proceedings/bigdata-congress/2015/7278/0", "title": "2015 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2012/4771/0/4771a013", "title": "Three-level Visualization of Internet Discussion with Extruded Word Clouds", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a013/12OmNyrIaxa", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2014/2555/0/06816707", "title": "Interactive hierarchical tag clouds for summarizing spatiotemporal social contents", "doi": null, "abstractUrl": "/proceedings-article/icde/2014/06816707/12OmNz6iOxa", "parentPublication": { "id": "proceedings/icde/2014/2555/0", "title": "2014 IEEE 30th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/11/06720109", "title": "Scalable Keyword Search on Large RDF Data", "doi": null, "abstractUrl": "/journal/tk/2014/11/06720109/13rRUwjGoGl", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/09/08665933", "title": "An Evaluation of Semantically Grouped Word Cloud Designs", "doi": null, "abstractUrl": "/journal/tg/2020/09/08665933/18l6IFPQspi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis4dh/2022/7668/0/766800a043", "title": "Word Clouds in the Wild", "doi": null, "abstractUrl": "/proceedings-article/vis4dh/2022/766800a043/1J2XH4Bdug0", "parentPublication": { "id": "proceedings/vis4dh/2022/7668/0", "title": "2022 IEEE 7th Workshop on Visualization for the Digital Humanities (VIS4DH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/12/09143452", "title": "PyramidTags: Context-, Time- and Word Order-Aware Tag Maps to Explore Large Document Collections", "doi": null, "abstractUrl": "/journal/tg/2021/12/09143452/1lxmwM0AM9O", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08017586", "articleId": "13rRUIJuxvp", "__typename": "AdjacentArticleType" }, "next": { "fno": "08017583", "articleId": "13rRUygBw7f", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNApLGHs", "title": "Feb.", "year": "2016", "issueNum": "02", "idPrefix": "td", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUEgs2LN", "doi": "10.1109/TPDS.2015.2401003", "abstract": "Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TFZ_$\\;\\times\\;$_Z IDF model are combined in the index construction and query generation. We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.", "abstracts": [ { "abstractType": "Regular", "content": "Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TF$\\;\\times\\;$ IDF model are combined in the index construction and query generation. We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TF- IDF model are combined in the index construction and query generation. We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.", "title": "A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data", "normalizedTitle": "A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data", "fno": "07039216", "hasPdf": true, "idPrefix": "td", "keywords": [ "Indexes", "Vectors", "Servers", "Encryption", "Keyword Search", "Clouds", "Cloud Computing", "Searchable Encryption", "Multi Keyword Ranked Search", "Dynamic Update", "Cloud Computing", "Searchable Encryption", "Multi Keyword Ranked Search", "Dynamic Update" ], "authors": [ { "givenName": "Zhihua", "surname": "Xia", "fullName": "Zhihua Xia", "affiliation": "Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, and School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xinhui", "surname": "Wang", "fullName": "Xinhui Wang", "affiliation": "Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, and School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xingming", "surname": "Sun", "fullName": "Xingming Sun", "affiliation": "Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, and School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Qian", "surname": "Wang", "fullName": "Qian Wang", "affiliation": "Key Lab of Aerospace Information Security and Trusted Computing, School of Computer, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2016-02-01 00:00:00", "pubType": "trans", "pages": "340-352", "year": "2016", "issn": "1045-9219", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cis/2013/2549/0/06746520", "title": "Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data", "doi": null, "abstractUrl": "/proceedings-article/cis/2013/06746520/12OmNBrlPxV", "parentPublication": { "id": "proceedings/cis/2013/2549/0", "title": "2013 Ninth International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2013/5028/0/5028a390", "title": "A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data", "doi": null, "abstractUrl": "/proceedings-article/cloud/2013/5028a390/12OmNqGRGnu", "parentPublication": { "id": "proceedings/cloud/2013/5028/0", "title": "2013 IEEE 6th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloudcom/2013/5095/1/5095a663", "title": "A Privacy-Preserving Fuzzy Keyword Search Scheme over Encrypted Cloud Data", "doi": null, "abstractUrl": "/proceedings-article/cloudcom/2013/5095a663/12OmNqI04LD", "parentPublication": { "id": "proceedings/cloudcom/2013/5095/1", "title": "2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdcloud/2015/7183/0/7183a082", "title": "RSAE: Ranked Keyword Search over Asymmetric Encrypted Cloud Data", "doi": null, "abstractUrl": "/proceedings-article/bdcloud/2015/7183a082/12OmNrkT7L3", "parentPublication": { "id": "proceedings/bdcloud/2015/7183/0", "title": "2015 IEEE Fifth International Conference on Big Data and Cloud Computing (BDCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2014/5079/0/5079a091", "title": "A Novel Dynamic Ranked Fuzzy Keyword Search over Cloud Encrypted Data", "doi": null, "abstractUrl": "/proceedings-article/dasc/2014/5079a091/12OmNxFaLk1", "parentPublication": { "id": "proceedings/dasc/2014/5079/0", "title": "2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2020/06/08089767", "title": "Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption", "doi": null, "abstractUrl": "/journal/sc/2020/06/08089767/13rRUxBJhsn", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2021/03/08385223", "title": "Semantic-based Compound Keyword Search over Encrypted Cloud Data", "doi": null, "abstractUrl": "/journal/sc/2021/03/08385223/13rRUxbCbr2", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2023/02/09709138", "title": "Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing", "doi": null, "abstractUrl": "/journal/sc/2023/02/09709138/1AR0qpX6dsA", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2023/01/09465718", "title": "Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds", "doi": null, "abstractUrl": "/journal/cc/2023/01/09465718/1uIR8zUjkje", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2023/01/09669122", "title": "VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data", "doi": null, "abstractUrl": "/journal/sc/2023/01/09669122/1zTfShZ0kJq", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07042318", "articleId": "13rRUxBJhvb", "__typename": "AdjacentArticleType" }, "next": { "fno": "07029117", "articleId": "13rRUEgs2BC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzl3WVX", "title": "Nov.", "year": "2014", "issueNum": "11", "idPrefix": "tk", "pubType": "journal", "volume": "26", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwjGoGl", "doi": "10.1109/TKDE.2014.2302294", "abstract": "Keyword search is a useful tool for exploring large Z_${\\sf RDF}$_Z data sets. Existing techniques either rely on constructing a distance matrix for pruning the search space or building summaries from the Z_${\\sf RDF}$_Z graphs for query processing. In this work, we show that existing techniques have serious limitations in dealing with realistic, large Z_${\\sf RDF}$_Z data with tens of millions of triples. Furthermore, the existing summarization techniques may lead to incorrect/incomplete results. To address these issues, we propose an effective summarization algorithm to summarize the Z_${\\sf RDF}$_Z data. Given a keyword query, the summaries lend significant pruning powers to exploratory keyword search and result in much better efficiency compared to previous works. Unlike existing techniques, our search algorithms always return correct results. Besides, the summaries we built can be updated incrementally and efficiently. Experiments on both benchmark and large real Z_${\\sf RDF}$_Z data sets show that our techniques are scalable and efficient.", "abstracts": [ { "abstractType": "Regular", "content": "Keyword search is a useful tool for exploring large ${\\sf RDF}$ data sets. Existing techniques either rely on constructing a distance matrix for pruning the search space or building summaries from the ${\\sf RDF}$ graphs for query processing. In this work, we show that existing techniques have serious limitations in dealing with realistic, large ${\\sf RDF}$ data with tens of millions of triples. Furthermore, the existing summarization techniques may lead to incorrect/incomplete results. To address these issues, we propose an effective summarization algorithm to summarize the ${\\sf RDF}$ data. Given a keyword query, the summaries lend significant pruning powers to exploratory keyword search and result in much better efficiency compared to previous works. Unlike existing techniques, our search algorithms always return correct results. Besides, the summaries we built can be updated incrementally and efficiently. Experiments on both benchmark and large real ${\\sf RDF}$ data sets show that our techniques are scalable and efficient.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Keyword search is a useful tool for exploring large - data sets. Existing techniques either rely on constructing a distance matrix for pruning the search space or building summaries from the - graphs for query processing. In this work, we show that existing techniques have serious limitations in dealing with realistic, large - data with tens of millions of triples. Furthermore, the existing summarization techniques may lead to incorrect/incomplete results. To address these issues, we propose an effective summarization algorithm to summarize the - data. Given a keyword query, the summaries lend significant pruning powers to exploratory keyword search and result in much better efficiency compared to previous works. Unlike existing techniques, our search algorithms always return correct results. Besides, the summaries we built can be updated incrementally and efficiently. Experiments on both benchmark and large real - data sets show that our techniques are scalable and efficient.", "title": "Scalable Keyword Search on Large RDF Data", "normalizedTitle": "Scalable Keyword Search on Large RDF Data", "fno": "06720109", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Resource Description Framework", "Keyword Search", "Buildings", "Query Processing", "Joining Processes", "Rockets", "Standards", "RDF Data", "Keywords Search", "RDF Graph" ], "authors": [ { "givenName": "Wangchao", "surname": "Le", "fullName": "Wangchao Le", "affiliation": "School of Computing, University of Utah, Salt Lake City,", "__typename": "ArticleAuthorType" }, { "givenName": "Feifei", "surname": "Li", "fullName": "Feifei Li", "affiliation": "School of Computing, University of Utah, Salt Lake City,", "__typename": "ArticleAuthorType" }, { "givenName": "Anastasios", "surname": "Kementsietsidis", "fullName": "Anastasios Kementsietsidis", "affiliation": "IBM Thomas J. Watson Research Center , 19 Skyline Dr., Hawthorne,", "__typename": "ArticleAuthorType" }, { "givenName": "Songyun", "surname": "Duan", "fullName": "Songyun Duan", "affiliation": "IBM Thomas J. Watson Research Center , 19 Skyline Dr., Hawthorne,", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2014-11-01 00:00:00", "pubType": "trans", "pages": "2774-2788", "year": "2014", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icde/2009/3545/0/3545a405", "title": "Top-k Exploration of Query Candidates for Efficient Keyword Search on Graph-Shaped (RDF) Data", "doi": null, "abstractUrl": "/proceedings-article/icde/2009/3545a405/12OmNASraAU", "parentPublication": { "id": "proceedings/icde/2009/3545/0", "title": "2009 IEEE 25th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2018/6306/0/630601a066", "title": "Quotient RDF Summaries Based on Type Hierarchies", "doi": null, "abstractUrl": "/proceedings-article/icdew/2018/630601a066/12OmNBlFQWr", "parentPublication": { "id": "proceedings/icdew/2018/6306/0", "title": "2018 IEEE 34th International Conference on Data Engineering Workshops (ICDEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2016/4457/0/4457a466", "title": "A Novel Method of Keyword Query for RDF Data Based on Bipartite Graph", "doi": null, "abstractUrl": "/proceedings-article/icpads/2016/4457a466/12OmNviZlA2", "parentPublication": { "id": "proceedings/icpads/2016/4457/0", "title": "2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363833", "title": "KeyLabel algorithms for keyword search in large graphs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363833/12OmNx7G67W", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2015/05/06940261", "title": "Keyword Search Over Probabilistic RDF Graphs", "doi": null, "abstractUrl": "/journal/tk/2015/05/06940261/13rRUwbs2bu", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/06/07828123", "title": "Keyword Search over Distributed Graphs with Compressed Signature", "doi": null, "abstractUrl": "/journal/tk/2017/06/07828123/13rRUyuvRpi", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258109", "title": "Towards a semantic keyword search over industrial knowledge graphs (extended abstract)", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258109/17D45WYQJ82", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/5555/01/09964067", "title": "Optimizing Keyword Search Over Federated RDF Systems", "doi": null, "abstractUrl": "/journal/bd/5555/01/09964067/1IAFF9AZN16", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400a338", "title": "An Efficient Parallel Keyword Search Engine on Knowledge Graphs", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400a338/1aDSQqRWiPu", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2021/2463/0/246300b143", "title": "A Keyword Query Approach Based on Community Structure of RDF Entity Graph", "doi": null, "abstractUrl": "/proceedings-article/compsac/2021/246300b143/1wLchDtr8mQ", "parentPublication": { "id": "proceedings/compsac/2021/2463/0", "title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06720117", "articleId": "13rRUIM2VC7", "__typename": "AdjacentArticleType" }, "next": { "fno": "06714549", "articleId": "13rRUx0gevn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvA1hrW", "title": "Nov.-Dec.", "year": "2014", "issueNum": "06", "idPrefix": "tb", "pubType": "journal", "volume": "11", "label": "Nov.-Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwI5Uer", "doi": "10.1109/TCBB.2014.2321403", "abstract": "Flow cytometry is able to measure the expressions of multiple proteins simultaneously at the single-cell level. A flow cytometry experiment on one biological sample provides measurements of several protein markers on or inside a large number of individual cells in that sample. Analysis of such data often aims to identify subpopulations of cells with distinct phenotypes. Currently, the most widely used analytical approach in the flow cytometry community is manual gating on a sequence of nested biaxial plots, which is highly subjective, labor intensive, and not exhaustive. To address those issues, a number of methods have been developed to automate the gating analysis by clustering algorithms. However, completely removing the subjectivity can be quite challenging. This paper describes an alternative approach. Instead of automating the analysis, we develop novel visualizations to facilitate manual gating. The proposed method views single-cell data of one biological sample as a high-dimensional point cloud of cells, derives the skeleton of the cloud, and unfolds the skeleton to generate 2D visualizations. We demonstrate the utility of the proposed visualization using real data, and provide quantitative comparison to visualizations generated from principal component analysis and multidimensional scaling.", "abstracts": [ { "abstractType": "Regular", "content": "Flow cytometry is able to measure the expressions of multiple proteins simultaneously at the single-cell level. A flow cytometry experiment on one biological sample provides measurements of several protein markers on or inside a large number of individual cells in that sample. Analysis of such data often aims to identify subpopulations of cells with distinct phenotypes. Currently, the most widely used analytical approach in the flow cytometry community is manual gating on a sequence of nested biaxial plots, which is highly subjective, labor intensive, and not exhaustive. To address those issues, a number of methods have been developed to automate the gating analysis by clustering algorithms. However, completely removing the subjectivity can be quite challenging. This paper describes an alternative approach. Instead of automating the analysis, we develop novel visualizations to facilitate manual gating. The proposed method views single-cell data of one biological sample as a high-dimensional point cloud of cells, derives the skeleton of the cloud, and unfolds the skeleton to generate 2D visualizations. We demonstrate the utility of the proposed visualization using real data, and provide quantitative comparison to visualizations generated from principal component analysis and multidimensional scaling.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Flow cytometry is able to measure the expressions of multiple proteins simultaneously at the single-cell level. A flow cytometry experiment on one biological sample provides measurements of several protein markers on or inside a large number of individual cells in that sample. Analysis of such data often aims to identify subpopulations of cells with distinct phenotypes. Currently, the most widely used analytical approach in the flow cytometry community is manual gating on a sequence of nested biaxial plots, which is highly subjective, labor intensive, and not exhaustive. To address those issues, a number of methods have been developed to automate the gating analysis by clustering algorithms. However, completely removing the subjectivity can be quite challenging. This paper describes an alternative approach. Instead of automating the analysis, we develop novel visualizations to facilitate manual gating. The proposed method views single-cell data of one biological sample as a high-dimensional point cloud of cells, derives the skeleton of the cloud, and unfolds the skeleton to generate 2D visualizations. We demonstrate the utility of the proposed visualization using real data, and provide quantitative comparison to visualizations generated from principal component analysis and multidimensional scaling.", "title": "Unfold High-Dimensional Clouds for Exhaustive Gating of Flow Cytometry Data", "normalizedTitle": "Unfold High-Dimensional Clouds for Exhaustive Gating of Flow Cytometry Data", "fno": "06809212", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Biology Computing", "Cellular Biophysics", "Cloud Computing", "Data Analysis", "Flow Measurement", "Molecular Biophysics", "Molecular Configurations", "Pattern Clustering", "Principal Component Analysis", "Proteins", "Unfold High Dimensional Clouds", "Exhaustive Gating", "Flow Cytometry Data", "Multiple Protein Expressions", "Single Cell Level", "Biological Sample", "Protein Marker Measurements", "Data Analysis", "Cell Subpopulations", "Distinct Phenotypes", "Analytical Approach", "Nested Biaxial Plots Sequence", "Gating Analysis", "Clustering Algorithms", "Manual Gating", "Single Cell Data", "High Dimensional Point Cloud", "2 D Visualizations", "Principal Component Analysis", "Multidimensional Scaling", "Data Visualization", "Logic Gates", "Computational Biology", "Proteins", "Genomics", "Biomedical Signal Processing", "Principal Component Analysis", "Cytometry", "Cells Biology", "Flow Cytometry", "Visualization", "Exhaustive Gating" ], "authors": [ { "givenName": "Peng", "surname": "Qiu", "fullName": "Peng Qiu", "affiliation": "Department of Biomedical Engineering, Georgia Institute of Technology and Emory University, Atlanta, GA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2014-11-01 00:00:00", "pubType": "trans", "pages": "1045-1051", "year": "2014", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2010/4083/0/4083a298", "title": "Ethanol Effects on Transcription Factor Network Regulating Stem Cell Differentiation", "doi": null, "abstractUrl": "/proceedings-article/bibe/2010/4083a298/12OmNA1Vnwv", "parentPublication": { "id": "proceedings/bibe/2010/4083/0", "title": "2010 IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2012/4357/0/06399751", "title": "Monitoring circulating cancer cells by multichannel in vivo flow cytometry", "doi": null, "abstractUrl": "/proceedings-article/bibe/2012/06399751/12OmNCf1DnO", "parentPublication": { "id": "proceedings/bibe/2012/4357/0", "title": "2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2015/6799/0/07359778", "title": "Chronic lymphocytic leukemia patient classification methodology through flow cytometry analysis", "doi": null, "abstractUrl": "/proceedings-article/bibm/2015/07359778/12OmNvFHfHs", "parentPublication": { "id": "proceedings/bibm/2015/6799/0", "title": "2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375753", "title": "Identification of Differential Flow Cytometry Expression", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375753/12OmNwAKCNe", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2015/6799/0/07359736", "title": "A two-stage clustering technique for automatic biaxial gating of flow cytometry data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2015/07359736/12OmNyL0Twe", "parentPublication": { "id": "proceedings/bibm/2015/6799/0", "title": "2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iacsit-sc/2009/3653/0/3653a451", "title": "Biomedical Implications of Robust Biomeasurement of Transient Modifications in Cells by Flow Cytometry", "doi": null, "abstractUrl": "/proceedings-article/iacsit-sc/2009/3653a451/12OmNz6iO6g", "parentPublication": { "id": "proceedings/iacsit-sc/2009/3653/0", "title": "Computer Science and Information Technology, International Association of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/04/07447731", "title": "Identifying Cell Populations in Flow Cytometry Data Using Phenotypic Signatures", "doi": null, "abstractUrl": "/journal/tb/2017/04/07447731/13rRUwh80Fv", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2015/05/07103016", "title": "Identify Critical Genes in Development with Consistent H3K4me2 Patterns across Multiple Tissues", "doi": null, "abstractUrl": "/journal/tb/2015/05/07103016/13rRUyYBlls", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546177", "title": "WGAN Latent Space Embeddings for Blast Identification in Childhood Acute Myeloid Leukaemia", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546177/17D45VVho3s", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2021/4261/0/09635492", "title": "Preliminary study for a fully automated pre-gating method for high-dimensional mass cytometry data", "doi": null, "abstractUrl": "/proceedings-article/bibe/2021/09635492/1zmvnHmlpx6", "parentPublication": { "id": "proceedings/bibe/2021/4261/0", "title": "2021 IEEE 21st International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06809195", "articleId": "13rRUyft7BD", "__typename": "AdjacentArticleType" }, "next": { "fno": "06819461", "articleId": "13rRUxYrbT6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxwWoNW", "title": "March-April", "year": "2019", "issueNum": "02", "idPrefix": "sc", "pubType": "journal", "volume": "12", "label": "March-April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUygBwfh", "doi": "10.1109/TSC.2016.2636285", "abstract": "Privacy is a pivotal issue of mobile apps because there is a plethora of personal and sensitive information in smartphones. Many mechanisms and tools are proposed to detect and mitigate privacy leaks. However, they rarely consider users' preferences and expectations. Users hold various expectation towards different mobile apps. For example, users may allow a social app to access their photos rather than a game app because it goes beyond users' expectation to access personal photos. Therefore, we believe it is practical and beneficial to understand users' privacy expectations on various mobile apps and help them mitigate privacy risks introduced by smartphones. To achieve this objective, we propose and implement PriWe, a system based on crowdsourcing driven by users who contribute privacy permission settings of the apps installed on their smartphones. PriWe leverages the crowdsourced permission settings to understand users' privacy expectations and provides app specific recommendations to mitigate information leakage. We deployed PriWe in the real world for evaluation. According to the feedback of 78 users who evaluated our system and 422 participants who completed our survey, PriWe is able to make proper recommendations which can match participants' privacy expectations and are mostly accepted by users, thereby help them to mitigate privacy disclosure in smartphones.", "abstracts": [ { "abstractType": "Regular", "content": "Privacy is a pivotal issue of mobile apps because there is a plethora of personal and sensitive information in smartphones. Many mechanisms and tools are proposed to detect and mitigate privacy leaks. However, they rarely consider users' preferences and expectations. Users hold various expectation towards different mobile apps. For example, users may allow a social app to access their photos rather than a game app because it goes beyond users' expectation to access personal photos. Therefore, we believe it is practical and beneficial to understand users' privacy expectations on various mobile apps and help them mitigate privacy risks introduced by smartphones. To achieve this objective, we propose and implement PriWe, a system based on crowdsourcing driven by users who contribute privacy permission settings of the apps installed on their smartphones. PriWe leverages the crowdsourced permission settings to understand users' privacy expectations and provides app specific recommendations to mitigate information leakage. We deployed PriWe in the real world for evaluation. According to the feedback of 78 users who evaluated our system and 422 participants who completed our survey, PriWe is able to make proper recommendations which can match participants' privacy expectations and are mostly accepted by users, thereby help them to mitigate privacy disclosure in smartphones.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Privacy is a pivotal issue of mobile apps because there is a plethora of personal and sensitive information in smartphones. Many mechanisms and tools are proposed to detect and mitigate privacy leaks. However, they rarely consider users' preferences and expectations. Users hold various expectation towards different mobile apps. For example, users may allow a social app to access their photos rather than a game app because it goes beyond users' expectation to access personal photos. Therefore, we believe it is practical and beneficial to understand users' privacy expectations on various mobile apps and help them mitigate privacy risks introduced by smartphones. To achieve this objective, we propose and implement PriWe, a system based on crowdsourcing driven by users who contribute privacy permission settings of the apps installed on their smartphones. PriWe leverages the crowdsourced permission settings to understand users' privacy expectations and provides app specific recommendations to mitigate information leakage. We deployed PriWe in the real world for evaluation. According to the feedback of 78 users who evaluated our system and 422 participants who completed our survey, PriWe is able to make proper recommendations which can match participants' privacy expectations and are mostly accepted by users, thereby help them to mitigate privacy disclosure in smartphones.", "title": "Understanding Mobile Users&#x2019; Privacy Expectations: A Recommendation-Based Method Through Crowdsourcing", "normalizedTitle": "Understanding Mobile Users’ Privacy Expectations: A Recommendation-Based Method Through Crowdsourcing", "fno": "07776979", "hasPdf": true, "idPrefix": "sc", "keywords": [ "Data Privacy", "Mobile Computing", "Outsourcing", "Recommender Systems", "Smart Phones", "Social Networking Online", "Social Application", "Game Application", "Personal Photos", "Mobile Application", "Mobile User Privacy Expectations", "Application Specific Recommendations", "Privacy Leaks", "Sensitive Information", "Personal Information", "Privacy Disclosure", "Crowdsourced Permission Settings", "Privacy Permission Settings", "Pri We", "Smartphones", "Privacy Risks", "Data Privacy", "Mobile Communication", "Smart Phones", "Data Privacy", "Security", "Recommender Systems", "Crowdsourcing", "Social Networking Online", "Mobile Privacy", "Mobile Applications", "Recommendation", "Crowdsourcing" ], "authors": [ { "givenName": "Rui", "surname": "Liu", "fullName": "Rui Liu", "affiliation": "Computer and Electronics Information, Guangxi University, Nanning, China", "__typename": "ArticleAuthorType" }, { "givenName": "Junbin", "surname": "Liang", "fullName": "Junbin Liang", "affiliation": "Guangxi Key Laboratory of Multimedia Communications and Network Technology, School of Computer and Electronics Information, Guangxi University, Nanning, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiannong", "surname": "Cao", "fullName": "Jiannong Cao", "affiliation": "Department of Computing, Hong Kong Polytechnic University, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Kehuan", "surname": "Zhang", "fullName": "Kehuan Zhang", "affiliation": "Department of Information Engineering, Chinese University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Wenyu", "surname": "Gao", "fullName": "Wenyu Gao", "affiliation": "Department of Statistics, Virginia Polytechnic Institute and State University, Blacksburg, VA", "__typename": "ArticleAuthorType" }, { "givenName": "Lei", "surname": "Yang", "fullName": "Lei Yang", "affiliation": "Department of Computing, Hong Kong Polytechnic University, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Ruiyun", "surname": "Yu", "fullName": "Ruiyun Yu", "affiliation": "Software College, Northeastern University, Shenyang, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2019-04-01 00:00:00", "pubType": "trans", "pages": "304-318", "year": "2019", "issn": "1939-1374", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ms/2015/7284/0/7284a150", "title": "PriWe: Recommendation for Privacy Settings of Mobile Apps Based on Crowdsourced Users' Expectations", "doi": null, "abstractUrl": "/proceedings-article/ms/2015/7284a150/12OmNBh8gVy", "parentPublication": { "id": "proceedings/ms/2015/7284/0", "title": "2015 IEEE International Conference on Mobile Services (MS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2014/6036/0/6036a657", "title": "Should Smartphone Users Mock Apps?", "doi": null, "abstractUrl": "/proceedings-article/mass/2014/6036a657/12OmNBlXs76", "parentPublication": { "id": "proceedings/mass/2014/6036/0", "title": "2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icstw/2015/1885/0/07107417", "title": "A survey on mobile users' software quality perceptions and expectations", "doi": null, "abstractUrl": "/proceedings-article/icstw/2015/07107417/12OmNCesr9Z", "parentPublication": { "id": "proceedings/icstw/2015/1885/0", "title": "2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2017/6543/0/6543a075", "title": "Mobi-SAGE: A Sparse Additive Generative Model for Mobile App Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icde/2017/6543a075/12OmNvk7K4P", "parentPublication": { "id": "proceedings/icde/2017/6543/0", "title": "2017 IEEE 33rd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2017/0367/2/0367b164", "title": "Is Pok&#xe9;mon GO Watching You? A Survey on the Privacy-Awareness of Location-Based Apps&#x2019; Users", "doi": null, "abstractUrl": "/proceedings-article/compsac/2017/0367b164/12OmNx3ZjgB", "parentPublication": { "id": "compsac/2017/0367/2", "title": "2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2017/3684/0/3684a084", "title": "A Privacy-Protection Data Separation Approach for Fine-Grained Data Access Management", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2017/3684a084/12OmNzTH0Hc", "parentPublication": { "id": "proceedings/smartcloud/2017/3684/0", "title": "2017 IEEE International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2018/05/07558179", "title": "When Privacy Meets Usability: Unobtrusive Privacy Permission Recommendation System for Mobile Apps Based on Crowdsourcing", "doi": null, "abstractUrl": "/journal/sc/2018/05/07558179/147pbVLa6tz", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icngcis/2017/4205/0/6361a048", "title": "Your Privacy is not so Private: Unveiling Android Apps Privacy Framework from the Dark", "doi": null, "abstractUrl": "/proceedings-article/icngcis/2017/6361a048/17D45WgziS3", "parentPublication": { "id": "proceedings/icngcis/2017/4205/0", "title": "2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euros&pw/2020/8597/0/859700a107", "title": "Data Sharing in Mobile Apps &#x2014; User Privacy Expectations in Europe", "doi": null, "abstractUrl": "/proceedings-article/euros&pw/2020/859700a107/1o8qnPcySl2", "parentPublication": { "id": "proceedings/euros&pw/2020/8597/0", "title": "2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2020/6975/0/697500a107", "title": "Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users&#x2019; Location Coordinates for Privacy Enhancement", "doi": null, "abstractUrl": "/proceedings-article/wetice/2020/697500a107/1qROY6Syucg", "parentPublication": { "id": "proceedings/wetice/2020/6975/0", "title": "2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07850959", "articleId": "198TguOpWkE", "__typename": "AdjacentArticleType" }, "next": { "fno": "07762944", "articleId": "13rRUwI5U5w", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1zBamVZHyne", "title": "Jan.", "year": "2022", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xic4JnxG2k", "doi": "10.1109/TVCG.2021.3114802", "abstract": "Charts go hand in hand with text to communicate complex data and are widely adopted in news articles, online blogs, and academic papers. They provide graphical summaries of the data, while text explains the message and context. However, synthesizing information across text and charts is difficult; it requires readers to frequently shift their attention. We investigated ways to support the tight coupling of text and charts in data documents. To understand their interplay, we analyzed the design space of chart-text references through news articles and scientific papers. Informed by the analysis, we developed a mixed-initiative interface enabling users to construct interactive references between text and charts. It leverages natural language processing to automatically suggest references as well as allows users to manually construct other references effortlessly. A user study complemented with algorithmic evaluation of the system suggests that the interface provides an effective way to compose interactive data documents.", "abstracts": [ { "abstractType": "Regular", "content": "Charts go hand in hand with text to communicate complex data and are widely adopted in news articles, online blogs, and academic papers. They provide graphical summaries of the data, while text explains the message and context. However, synthesizing information across text and charts is difficult; it requires readers to frequently shift their attention. We investigated ways to support the tight coupling of text and charts in data documents. To understand their interplay, we analyzed the design space of chart-text references through news articles and scientific papers. Informed by the analysis, we developed a mixed-initiative interface enabling users to construct interactive references between text and charts. It leverages natural language processing to automatically suggest references as well as allows users to manually construct other references effortlessly. A user study complemented with algorithmic evaluation of the system suggests that the interface provides an effective way to compose interactive data documents.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Charts go hand in hand with text to communicate complex data and are widely adopted in news articles, online blogs, and academic papers. They provide graphical summaries of the data, while text explains the message and context. However, synthesizing information across text and charts is difficult; it requires readers to frequently shift their attention. We investigated ways to support the tight coupling of text and charts in data documents. To understand their interplay, we analyzed the design space of chart-text references through news articles and scientific papers. Informed by the analysis, we developed a mixed-initiative interface enabling users to construct interactive references between text and charts. It leverages natural language processing to automatically suggest references as well as allows users to manually construct other references effortlessly. A user study complemented with algorithmic evaluation of the system suggests that the interface provides an effective way to compose interactive data documents.", "title": "Kori: Interactive Synthesis of Text and Charts in Data Documents", "normalizedTitle": "Kori: Interactive Synthesis of Text and Charts in Data Documents", "fno": "09552930", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Natural Language Processing", "Text Analysis", "User Interfaces", "Academic Papers", "Chart Text References", "Charts", "Complex Data", "Interactive Data Documents", "Interactive Synthesis", "Kori", "Natural Language Processing", "News Articles", "Data Visualization", "Visualization", "Tools", "Programming", "Bars", "Syntactics", "Natural Language Processing", "Data Driven Storytelling", "Interaction Design", "Authoring", "Visualization Text Linking", "Mixed Initiative Interface", "Interactive Documents" ], "authors": [ { "givenName": "Shahid", "surname": "Latif", "fullName": "Shahid Latif", "affiliation": "University of Duisburg-Essen, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Zheng", "surname": "Zhou", "fullName": "Zheng Zhou", "affiliation": "Boston College, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Yoon", "surname": "Kim", "fullName": "Yoon Kim", "affiliation": "Harvard University, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Fabian", "surname": "Beck", "fullName": "Fabian Beck", "affiliation": "University of Duisburg-Essen, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Nam Wook", "surname": "Kim", "fullName": "Nam Wook Kim", "affiliation": "Boston College, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "trans", "pages": "184-194", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iv/2017/0831/0/0831a096", "title": "Microtext Line Charts", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a096/12OmNAqkSCW", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2013/0792/0/06616467", "title": "Identifying temporal relations between main events in new articles", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2013/06616467/12OmNvjQ8WN", "parentPublication": { "id": "proceedings/aiccsa/2013/0792/0", "title": "2013 ACS International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/caia/1991/2135/1/00120841", "title": "Extracting company names from text", "doi": null, "abstractUrl": "/proceedings-article/caia/1991/00120841/12OmNzcxZlp", "parentPublication": { "id": "proceedings/caia/1991/2135/1", "title": "Proceedings The Seventh IEEE Conference on Artificial Intelligence Application", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017611", "title": "Blinded with Science or Informed by Charts? A Replication Study", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017611/13rRUxAAT7J", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192669", "title": "TimeLineCurator: Interactive Authoring of Visual Timelines from Unstructured Text", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192669/13rRUxjQyvn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2018/9264/0/926400a142", "title": "Extracting Visual Encodings from Map Chart Images with Color-Encoded Scalar Values", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2018/926400a142/17D45WaTkiB", "parentPublication": { "id": "proceedings/sibgrapi/2018/9264/0", "title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnlp/2022/9544/0/954400a385", "title": "Investigating Text Complexity of Reading in National Matriculation English Test", "doi": null, "abstractUrl": "/proceedings-article/icnlp/2022/954400a385/1GNtszOPwfS", "parentPublication": { "id": "proceedings/icnlp/2022/9544/0", "title": "2022 4th International Conference on Natural Language Processing (ICNLP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904452", "title": "Striking a Balance: Reader Takeaways and Preferences when Integrating Text and Charts", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904452/1H1gordOnfy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a151", "title": "The Cost of Pie Charts", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a151/1cMFcqwGM5q", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101527", "title": "Crowdsourcing-based Data Extraction from Visualization Charts", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101527/1kaMJ95VHQk", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09585700", "articleId": "1y11cGSPuPC", "__typename": "AdjacentArticleType" }, "next": { "fno": "09552844", "articleId": "1xic3q426Os", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1zBaP58HDxu", "name": "ttg202201-09552930s1-tvcg-3114802-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202201-09552930s1-tvcg-3114802-mm.zip", "extension": "zip", "size": "27.4 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNrAMF5N", "title": "Jan.-Mar.", "year": "2017", "issueNum": "01", "idPrefix": "mu", "pubType": "magazine", "volume": "24", "label": "Jan.-Mar.", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxBa5kC", "doi": "10.1109/MMUL.2017.19", "abstract": "Most contemporary Western performing arts practices restrict creative interactions from audiences. Open Symphony is designed to explore audience-performer interaction in live music performances, assisted by digital technology. Audiences can conduct improvising performers by voting for various musical \"modes.\" Technological components include a web-based mobile application, a visual client displaying generated symbolic scores, and a server service for the exchange of creative data. The interaction model, app, and visualization were designed through an iterative participatory design process. The system was experienced by about 120 audience and performer participants (35 completed surveys) in controlled (lab) and real-world settings. Feedback on usability and user experience was overall positive, and live interactions demonstrate significant levels of audience creative engagement. The authors identified further design challenges around audience sense of control, learnability, and compositional structure. This article is part of a special issue on multimedia for enriched music.", "abstracts": [ { "abstractType": "Regular", "content": "Most contemporary Western performing arts practices restrict creative interactions from audiences. Open Symphony is designed to explore audience-performer interaction in live music performances, assisted by digital technology. Audiences can conduct improvising performers by voting for various musical \"modes.\" Technological components include a web-based mobile application, a visual client displaying generated symbolic scores, and a server service for the exchange of creative data. The interaction model, app, and visualization were designed through an iterative participatory design process. The system was experienced by about 120 audience and performer participants (35 completed surveys) in controlled (lab) and real-world settings. Feedback on usability and user experience was overall positive, and live interactions demonstrate significant levels of audience creative engagement. The authors identified further design challenges around audience sense of control, learnability, and compositional structure. This article is part of a special issue on multimedia for enriched music.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most contemporary Western performing arts practices restrict creative interactions from audiences. Open Symphony is designed to explore audience-performer interaction in live music performances, assisted by digital technology. Audiences can conduct improvising performers by voting for various musical \"modes.\" Technological components include a web-based mobile application, a visual client displaying generated symbolic scores, and a server service for the exchange of creative data. The interaction model, app, and visualization were designed through an iterative participatory design process. The system was experienced by about 120 audience and performer participants (35 completed surveys) in controlled (lab) and real-world settings. Feedback on usability and user experience was overall positive, and live interactions demonstrate significant levels of audience creative engagement. The authors identified further design challenges around audience sense of control, learnability, and compositional structure. This article is part of a special issue on multimedia for enriched music.", "title": "Open Symphony: Creative Participation for Audiences of Live Music Performances", "normalizedTitle": "Open Symphony: Creative Participation for Audiences of Live Music Performances", "fno": "mmu2017010048", "hasPdf": true, "idPrefix": "mu", "keywords": [ "Music", "Art", "Performance Evaluation", "Visualization", "Creativity", "Mobile Communication", "Software Engineering", "Participatory Live Music Performance", "Music Interaction", "Audience Engagement", "Audience Experience", "Music Visualization", "Stage Augmentation", "Creativity", "Music Improvisation", "Multimedia", "Mobile", "Web" ], "authors": [ { "givenName": "Yongmeng", "surname": "Wu", "fullName": "Yongmeng Wu", "affiliation": "Queen Mary University of London", "__typename": "ArticleAuthorType" }, { "givenName": "Leshao", "surname": "Zhang", "fullName": "Leshao Zhang", "affiliation": "Queen Mary University of London", "__typename": "ArticleAuthorType" }, { "givenName": "Nick", "surname": "Bryan-Kinns", "fullName": "Nick Bryan-Kinns", "affiliation": "Queen Mary University of London", "__typename": "ArticleAuthorType" }, { "givenName": "Mathieu", "surname": "Barthet", "fullName": "Mathieu Barthet", "affiliation": "Queen Mary University of London", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2017-01-01 00:00:00", "pubType": "mags", "pages": "48-62", "year": "2017", "issn": "1070-986X", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icmew/2016/1552/0/07574723", "title": "Crowdsourcing audience perspectives on classical music", "doi": null, "abstractUrl": "/proceedings-article/icmew/2016/07574723/12OmNAXxWX5", "parentPublication": { "id": "proceedings/icmew/2016/1552/0", "title": "2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2009/4800/0/05349469", "title": "Measurement of motion and emotion during musical performance", "doi": null, "abstractUrl": "/proceedings-article/acii/2009/05349469/12OmNBOCWzq", "parentPublication": { "id": "proceedings/acii/2009/4800/0", "title": "2009 3rd International Conference on Affective Computing and Intelligent Interaction and Workshops (ACII 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispan-fcst-iscc/2017/0840/0/0840a477", "title": "Creating Opera for Mobile Media: Artistic Opportunities and Technical Limitations", "doi": null, "abstractUrl": "/proceedings-article/ispan-fcst-iscc/2017/0840a477/12OmNBPc8tk", "parentPublication": { "id": "proceedings/ispan-fcst-iscc/2017/0840/0", "title": "2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670e404", "title": "Ease of Attribution, Ease of Licensing, and Integration of Creative Works", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670e404/12OmNs0TKIQ", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2016/05/mcg2016050082", "title": "Spatial Interfaces and Interactive 3D Environments for Immersive Musical Performances", "doi": null, "abstractUrl": "/magazine/cg/2016/05/mcg2016050082/13rRUyfKIKI", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2018/9269/0/926900a124", "title": "Supporting the Sense of Unity between Remote Audiences in VR-Based Remote Live Music Support System KSA2", "doi": null, "abstractUrl": "/proceedings-article/aivr/2018/926900a124/17D45WrVg3D", "parentPublication": { "id": "proceedings/aivr/2018/9269/0", "title": "2018 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2022/9617/0/961700a775", "title": "Audience Experiences of a Volumetric Virtual Reality Music Video", "doi": null, "abstractUrl": "/proceedings-article/vr/2022/961700a775/1CJbVwKQabK", "parentPublication": { "id": "proceedings/vr/2022/9617/0", "title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2020/1485/0/09105995", "title": "Creation of a Hyper-Realistic Remote Music Session with Professional Musicians and Public Audiences Using 5G Commodity Hardware", "doi": null, "abstractUrl": "/proceedings-article/icmew/2020/09105995/1kwqMgCPok0", "parentPublication": { "id": "proceedings/icmew/2020/1485/0", "title": "2020 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2020/6901/0/09127204", "title": "Disruption and creativity in live coding", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2020/09127204/1lvQ1akNTTq", "parentPublication": { "id": "proceedings/vl-hcc/2020/6901/0", "title": "2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a090", "title": "First Steps Towards Augmented Reality Interactive Electronic Music Production", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a090/1tnWYWjfAFa", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mmu2017010036", "articleId": "13rRUwbJD22", "__typename": "AdjacentArticleType" }, "next": { "fno": "mmu2017010063", "articleId": "13rRUwjGoIi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1KmyNRPfdXG", "title": "March", "year": "2023", "issueNum": "03", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1yyho082gEw", "doi": "10.1109/TVCG.2021.3128157", "abstract": "Data visualizations have been increasingly used in oral presentations to communicate data patterns to the general public. Clear verbal introductions of visualizations to explain how to interpret the visually encoded information are essential to convey the takeaways and avoid misunderstandings. We contribute a series of studies to investigate how to effectively introduce visualizations to the audience with varying degrees of visualization literacy. We begin with understanding how people are introducing visualizations. We crowdsource 110 introductions of visualizations and categorize them based on their content and structures. From these crowdsourced introductions, we identify different introduction strategies and generate a set of introductions for evaluation. We conduct experiments to systematically compare the effectiveness of different introduction strategies across four visualizations with 1,080 participants. We find that introductions explaining visual encodings with concrete examples are the most effective. Our study provides both qualitative and quantitative insights into how to construct effective verbal introductions of visualizations in presentations, inspiring further research in data storytelling.", "abstracts": [ { "abstractType": "Regular", "content": "Data visualizations have been increasingly used in oral presentations to communicate data patterns to the general public. Clear verbal introductions of visualizations to explain how to interpret the visually encoded information are essential to convey the takeaways and avoid misunderstandings. We contribute a series of studies to investigate how to effectively introduce visualizations to the audience with varying degrees of visualization literacy. We begin with understanding how people are introducing visualizations. We crowdsource 110 introductions of visualizations and categorize them based on their content and structures. From these crowdsourced introductions, we identify different introduction strategies and generate a set of introductions for evaluation. We conduct experiments to systematically compare the effectiveness of different introduction strategies across four visualizations with 1,080 participants. We find that introductions explaining visual encodings with concrete examples are the most effective. Our study provides both qualitative and quantitative insights into how to construct effective verbal introductions of visualizations in presentations, inspiring further research in data storytelling.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data visualizations have been increasingly used in oral presentations to communicate data patterns to the general public. Clear verbal introductions of visualizations to explain how to interpret the visually encoded information are essential to convey the takeaways and avoid misunderstandings. We contribute a series of studies to investigate how to effectively introduce visualizations to the audience with varying degrees of visualization literacy. We begin with understanding how people are introducing visualizations. We crowdsource 110 introductions of visualizations and categorize them based on their content and structures. From these crowdsourced introductions, we identify different introduction strategies and generate a set of introductions for evaluation. We conduct experiments to systematically compare the effectiveness of different introduction strategies across four visualizations with 1,080 participants. We find that introductions explaining visual encodings with concrete examples are the most effective. Our study provides both qualitative and quantitative insights into how to construct effective verbal introductions of visualizations in presentations, inspiring further research in data storytelling.", "title": "Explaining With Examples: Lessons Learned From Crowdsourced Introductory Description of Information Visualizations", "normalizedTitle": "Explaining With Examples: Lessons Learned From Crowdsourced Introductory Description of Information Visualizations", "fno": "09615008", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Computer Literacy", "Crowdsourcing", "Data Visualisation", "Multimedia Computing", "Crowdsourced Introductory Description", "Data Storytelling", "Data Visualizations", "Information Visualizations", "Oral Presentations", "Verbal Introductions", "Visual Encodings", "Visualization Literacy", "Data Visualization", "Visualization", "Encoding", "Education", "Task Analysis", "Annotations", "Design Methodology", "Narrative Visualization", "Oral Presentation", "Introduction" ], "authors": [ { "givenName": "Leni", "surname": "Yang", "fullName": "Leni Yang", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Cindy", "surname": "Xiong", "fullName": "Cindy Xiong", "affiliation": "University of Massachusetts Amherst, Amherst, MA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jason K.", "surname": "Wong", "fullName": "Jason K. Wong", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Aoyu", "surname": "Wu", "fullName": "Aoyu Wu", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Huamin", "surname": "Qu", "fullName": "Huamin Qu", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "1638-1650", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iv/2011/0868/0/06004064", "title": "Listening to Managers: A Study about Visualizations in Corporate Presentations", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004064/12OmNqBbHF8", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2014/3922/0/07044207", "title": "Interactive visualizations for teaching quantum mechanics and semiconductor physics", "doi": null, "abstractUrl": "/proceedings-article/fie/2014/07044207/12OmNxEBz3P", "parentPublication": { "id": "proceedings/fie/2014/3922/0", "title": "2014 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07536142", "title": "Exploring the Possibilities of Embedding Heterogeneous Data Attributes in Familiar Visualizations", "doi": null, "abstractUrl": "/journal/tg/2017/01/07536142/13rRUEgarjx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017606", "title": "Active Reading of Visualizations", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017606/13rRUyYSWl5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a160", "title": "Beyond Visuals: Examining the Experiences of Geoscience Professionals With Vision Disabilities in Accessing Data Visualizations", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a160/1J6hbizj1Xq", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waie/2022/6351/0/635100a001", "title": "Design and Implementation of a Teaching Verbal Behavior Analysis Aid in Instructional Videos", "doi": null, "abstractUrl": "/proceedings-article/waie/2022/635100a001/1KzzolbliEw", "parentPublication": { "id": "proceedings/waie/2022/6351/0", "title": "2022 4th International Workshop on Artificial Intelligence and Education (WAIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2019/05/08744242", "title": "Data2Vis: Automatic Generation of Data Visualizations Using Sequence-to-Sequence Recurrent Neural Networks", "doi": null, "abstractUrl": "/magazine/cg/2019/05/08744242/1cFV5domibu", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08809832", "title": "Searching the Visual Style and Structure of D3 Visualizations", "doi": null, "abstractUrl": "/journal/tg/2020/01/08809832/1cHEgg8WeNW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933747", "title": "EasyPZ.js: Interaction Binding for Pan and Zoom Visualizations", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933747/1fTgFR19dTi", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/beliv/2020/9642/0/964200a019", "title": "How to evaluate data visualizations across different levels of understanding", "doi": null, "abstractUrl": "/proceedings-article/beliv/2020/964200a019/1q0FOQPpIic", "parentPublication": { "id": "proceedings/beliv/2020/9642/0", "title": "2020 IEEE Workshop on Evaluation and Beyond - Methodological Approaches to Visualization (BELIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09610985", "articleId": "1ypYfbK3U88", "__typename": "AdjacentArticleType" }, "next": { "fno": "09614998", "articleId": "1yyho7vk3cs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1KmyWuhEmpa", "name": "ttg202303-09615008s1-tvcg-3128157-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202303-09615008s1-tvcg-3128157-mm.zip", "extension": "zip", "size": "10.7 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNALlcj1", "title": "May", "year": "2018", "issueNum": "05", "idPrefix": "tk", "pubType": "journal", "volume": "30", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwInvfB", "doi": "10.1109/TKDE.2017.2783933", "abstract": "Community search is important in graph analysis and can be used in many real applications. In the literature, various community models have been proposed. However, most of them cannot well identify the overlaps between communities which is an essential feature of real graphs. To address this issue, the Z_$k$_Z -clique percolation community model was proposed and has been proven effective in many applications. Motivated by this, in this paper, we adopt the Z_$k$_Z -clique percolation community model and study the densest clique percolation community search problem which aims to find the Z_$k$_Z -clique percolation community with the maximum Z_$k$_Z value that contains a given set of query nodes. We adopt an index-based approach to solve this problem. Based on the observation that a Z_$k$_Z -clique percolation community is a union of maximal cliques, we devise a novel compact index, Z_$\\mathsf {DCPC}$_Z - Z_$\\mathsf {Index}$_Z , to preserve the maximal cliques and their connectivity information of the input graph. With Z_$\\mathsf {DCPC}$_Z- Z_$\\mathsf {Index}$_Z , we can answer the densest clique percolation community query efficiently. Besides, we also propose an index construction algorithm based on the definition of Z_$\\mathsf {DCPC}$_Z - Z_$\\mathsf {Index}$_Z and further improve the algorithm in terms of efficiency and memory consumption. We conduct extensive performance studies on real graphs and the experimental results demonstrate the efficiency of our index-based query processing algorithm and index construction algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "Community search is important in graph analysis and can be used in many real applications. In the literature, various community models have been proposed. However, most of them cannot well identify the overlaps between communities which is an essential feature of real graphs. To address this issue, the $k$ -clique percolation community model was proposed and has been proven effective in many applications. Motivated by this, in this paper, we adopt the $k$ -clique percolation community model and study the densest clique percolation community search problem which aims to find the $k$ -clique percolation community with the maximum $k$ value that contains a given set of query nodes. We adopt an index-based approach to solve this problem. Based on the observation that a $k$ -clique percolation community is a union of maximal cliques, we devise a novel compact index, $\\mathsf {DCPC}$ - $\\mathsf {Index}$ , to preserve the maximal cliques and their connectivity information of the input graph. With $\\mathsf {DCPC}$- $\\mathsf {Index}$ , we can answer the densest clique percolation community query efficiently. Besides, we also propose an index construction algorithm based on the definition of $\\mathsf {DCPC}$ - $\\mathsf {Index}$ and further improve the algorithm in terms of efficiency and memory consumption. We conduct extensive performance studies on real graphs and the experimental results demonstrate the efficiency of our index-based query processing algorithm and index construction algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Community search is important in graph analysis and can be used in many real applications. In the literature, various community models have been proposed. However, most of them cannot well identify the overlaps between communities which is an essential feature of real graphs. To address this issue, the - -clique percolation community model was proposed and has been proven effective in many applications. Motivated by this, in this paper, we adopt the - -clique percolation community model and study the densest clique percolation community search problem which aims to find the - -clique percolation community with the maximum - value that contains a given set of query nodes. We adopt an index-based approach to solve this problem. Based on the observation that a - -clique percolation community is a union of maximal cliques, we devise a novel compact index, - - - , to preserve the maximal cliques and their connectivity information of the input graph. With -- - , we can answer the densest clique percolation community query efficiently. Besides, we also propose an index construction algorithm based on the definition of - - - and further improve the algorithm in terms of efficiency and memory consumption. We conduct extensive performance studies on real graphs and the experimental results demonstrate the efficiency of our index-based query processing algorithm and index construction algorithm.", "title": "Index-Based Densest Clique Percolation Community Search in Networks", "normalizedTitle": "Index-Based Densest Clique Percolation Community Search in Networks", "fno": "08214241", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Search Problems", "Indexes", "Proteins", "Social Network Services", "Memory Management", "Semantics", "Query Processing", "K Clique Percolation Community", "Community Search", "Social Network" ], "authors": [ { "givenName": "Long", "surname": "Yuan", "fullName": "Long Yuan", "affiliation": "School of Computer Science and Engineering, University of New South Wales, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Lu", "surname": "Qin", "fullName": "Lu Qin", "affiliation": "QCIS, University of Technology, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Wenjie", "surname": "Zhang", "fullName": "Wenjie Zhang", "affiliation": "School of Computer Science and Engineering, University of New South Wales, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Lijun", "surname": "Chang", "fullName": "Lijun Chang", "affiliation": "School of Computer Science and Engineering, University of New South Wales, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Jianye", "surname": "Yang", "fullName": "Jianye Yang", "affiliation": "School of Computer Science and Engineering, University of New South Wales, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2018-05-01 00:00:00", "pubType": "trans", "pages": "922-935", "year": "2018", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icde/2017/6543/0/6543a871", "title": "Most Influential Community Search over Large Social Networks", "doi": null, "abstractUrl": "/proceedings-article/icde/2017/6543a871/12OmNApcusb", "parentPublication": { "id": "proceedings/icde/2017/6543/0", "title": "2017 IEEE 33rd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113300", "title": "Diversified top-k clique search", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113300/12OmNrIrPwf", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a274", "title": "Percolation Computation in Complex Networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a274/12OmNzCF4RP", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/01/08051071", "title": "String Similarity Search: A Hash-Based Approach", "doi": null, "abstractUrl": "/journal/tk/2018/01/08051071/13rRUygBw7z", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2018/5520/0/552000a245", "title": "Efficient Signed Clique Search in Signed Networks", "doi": null, "abstractUrl": "/proceedings-article/icde/2018/552000a245/14Fq0ZtqK7S", "parentPublication": { "id": "proceedings/icde/2018/5520/0", "title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/02/08665929", "title": "Signed Clique Search in Signed Networks: Concepts and Algorithms", "doi": null, "abstractUrl": "/journal/tk/2021/02/08665929/18l6Ft2FPvW", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09779084", "title": "Stable Subgraph Isomorphism Search in Temporal Networks", "doi": null, "abstractUrl": "/journal/tk/2023/06/09779084/1DvfKAsa8gg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10025375", "title": "Maximal Clique Search in Weighted Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/10025375/1KcfWWSjp4s", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400c161", "title": "Index-Based Densest Clique Percolation Community Search in Networks (Extended Abstract)", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400c161/1aDSPiWn864", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/04/09629291", "title": "Efficient Influential Community Search in Large Uncertain Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/04/09629291/1yXvGVkW7ra", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08128496", "articleId": "13rRUwInv4W", "__typename": "AdjacentArticleType" }, "next": { "fno": "08186208", "articleId": "13rRUxASuAX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgEp", "name": "ttk201805-08214241s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttk201805-08214241s1.zip", "extension": "zip", "size": "273 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNBTJIK7", "title": "Aug.", "year": "2013", "issueNum": "08", "idPrefix": "td", "pubType": "journal", "volume": "24", "label": "Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUx0Pqpj", "doi": "10.1109/TPDS.2012.229", "abstract": "The analysis of real-world complex networks has been the focus of recent research. Detecting communities helps in uncovering their structural and functional organization. Valuable insight can be obtained by analyzing the dense, overlapping, and highly interwoven Z_$(k)$_Z-clique communities. However, their detection is challenging due to extensive memory requirements and execution time. In this paper, we present a novel, parallel Z_$(k)$_Z-clique community detection method, based on an innovative technique which enables connected components of a network to be obtained from those of its subnetworks. The novel method has an unbounded, user-configurable, and input-independent maximum degree of parallelism, and hence is able to make full use of computational resources. Theoretical tight upper bounds on its worst case time and space complexities are given as well. Experiments on real-world networks such as the Internet and the World Wide Web confirmed the almost optimal use of parallelism (i.e., a linear speedup). Comparisons with other state-of-the-art Z_$(k)$_Z-clique community detection methods show dramatic reductions in execution time and memory footprint. An open-source implementation of the method is also made publicly available.", "abstracts": [ { "abstractType": "Regular", "content": "The analysis of real-world complex networks has been the focus of recent research. Detecting communities helps in uncovering their structural and functional organization. Valuable insight can be obtained by analyzing the dense, overlapping, and highly interwoven $(k)$-clique communities. However, their detection is challenging due to extensive memory requirements and execution time. In this paper, we present a novel, parallel $(k)$-clique community detection method, based on an innovative technique which enables connected components of a network to be obtained from those of its subnetworks. The novel method has an unbounded, user-configurable, and input-independent maximum degree of parallelism, and hence is able to make full use of computational resources. Theoretical tight upper bounds on its worst case time and space complexities are given as well. Experiments on real-world networks such as the Internet and the World Wide Web confirmed the almost optimal use of parallelism (i.e., a linear speedup). Comparisons with other state-of-the-art $(k)$-clique community detection methods show dramatic reductions in execution time and memory footprint. An open-source implementation of the method is also made publicly available.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The analysis of real-world complex networks has been the focus of recent research. Detecting communities helps in uncovering their structural and functional organization. Valuable insight can be obtained by analyzing the dense, overlapping, and highly interwoven --clique communities. However, their detection is challenging due to extensive memory requirements and execution time. In this paper, we present a novel, parallel --clique community detection method, based on an innovative technique which enables connected components of a network to be obtained from those of its subnetworks. The novel method has an unbounded, user-configurable, and input-independent maximum degree of parallelism, and hence is able to make full use of computational resources. Theoretical tight upper bounds on its worst case time and space complexities are given as well. Experiments on real-world networks such as the Internet and the World Wide Web confirmed the almost optimal use of parallelism (i.e., a linear speedup). Comparisons with other state-of-the-art --clique community detection methods show dramatic reductions in execution time and memory footprint. An open-source implementation of the method is also made publicly available.", "title": "Parallel Z_$(k)$_Z-Clique Community Detection on Large-Scale Networks", "normalizedTitle": "Parallel --Clique Community Detection on Large-Scale Networks", "fno": "ttd2013081651", "hasPdf": true, "idPrefix": "td", "keywords": [ "Communities", "Internet", "Complexity Theory", "Program Processors", "Parallel Processing", "Sparse Matrices", "Optimization", "K Clique Communities", "Communities", "Internet", "Complexity Theory", "Program Processors", "Parallel Processing", "Sparse Matrices", "Optimization", "Parallel Community Detection Method" ], "authors": [ { "givenName": "Enrico", "surname": "Gregori", "fullName": "Enrico Gregori", "affiliation": "Italian National Research Council, Pisa", "__typename": "ArticleAuthorType" }, { "givenName": "Luciano", "surname": "Lenzini", "fullName": "Luciano Lenzini", "affiliation": "University of Pisa, Pisa", "__typename": "ArticleAuthorType" }, { "givenName": "Simone", "surname": "Mainardi", "fullName": "Simone Mainardi", "affiliation": "University of Pisa and Italian National Research Council, Pisa", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "08", "pubDate": "2013-08-01 00:00:00", "pubType": "trans", "pages": "1651-1660", "year": "2013", "issn": "1045-9219", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ci/2013/3194/0/06855926", "title": "Efficient Community Detection in Large Scale Networks", "doi": null, "abstractUrl": "/proceedings-article/ci/2013/06855926/12OmNAtaS0a", "parentPublication": { "id": "proceedings/ci/2013/3194/0", "title": "2013 BRICS Congress on Computational Intelligence & 11th Brazilian Congress on Computational Intelligence (BRICS-CCI & CBIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113300", "title": "Diversified top-k clique search", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113300/12OmNrIrPwf", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2014/5877/0/06921582", "title": "Detecting highly overlapping community structure based on Maximal Clique Networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921582/12OmNwHQB95", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004267", "title": "Clique guided community detection", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004267/12OmNx4Q6Ca", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcsw/2011/4386/0/4386a134", "title": "k-clique Communities in the Internet AS-level Topology Graph", "doi": null, "abstractUrl": "/proceedings-article/icdcsw/2011/4386a134/12OmNz61dA4", "parentPublication": { "id": "proceedings/icdcsw/2011/4386/0", "title": "2011 31st International Conference on Distributed Computing Systems Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2010/4244/0/4244a193", "title": "The Monotone Complexity of k-clique on Random Graphs", "doi": null, "abstractUrl": "/proceedings-article/focs/2010/4244a193/12OmNzC5TlX", "parentPublication": { "id": "proceedings/focs/2010/4244/0", "title": "2010 IEEE 51st Annual Symposium on Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/05/08214241", "title": "Index-Based Densest Clique Percolation Community Search in Networks", "doi": null, "abstractUrl": "/journal/tk/2018/05/08214241/13rRUwInvfB", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017588", "title": "Clique Community Persistence: A Topological Visual Analysis Approach for Complex Networks", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017588/13rRUwd9CG8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300b955", "title": "Efficient <tex>Z_$k-\\text{clique}$_Z</tex> Listing with Set Intersection Speedup", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300b955/1FwFCNqiymQ", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400c161", "title": "Index-Based Densest Clique Percolation Community Search in Networks (Extended Abstract)", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400c161/1aDSPiWn864", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttd2013081644", "articleId": "13rRUxCitIV", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttd2013081661", "articleId": "13rRUxC0SvF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgQf", "name": "ttd2013081651s.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttd2013081651s.pdf", "extension": "pdf", "size": "255 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwJPMX5", "title": "Dec.", "year": "2011", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "17", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwI5Ug3", "doi": "10.1109/TVCG.2011.245", "abstract": "Sparse, irregular sampling is becoming a necessity for reconstructing large and high-dimensional signals. However, the analysis of this type of data remains a challenge. One issue is the robust selection of neighborhoods − a crucial part of analytic tools such as topological decomposition, clustering and gradient estimation. When extracting the topology of sparsely sampled data, common neighborhood strategies such as k-nearest neighbors may lead to inaccurate results, either due to missing neighborhood connections, which introduce false extrema, or due to spurious connections, which conceal true extrema. Other neighborhoods, such as the Delaunay triangulation, are costly to compute and store even in relatively low dimensions. In this paper, we address these issues. We present two new types of neighborhood graphs: a variation on and a generalization of empty region graphs, which considerably improve the robustness of neighborhood-based analysis tools, such as topological decomposition. Our findings suggest that these neighborhood graphs lead to more accurate topological representations of low- and high- dimensional data sets at relatively low cost, both in terms of storage and computation time. We describe the implications of our work in the analysis and visualization of scalar functions, and provide general strategies for computing and applying our neighborhood graphs towards robust data analysis.", "abstracts": [ { "abstractType": "Regular", "content": "Sparse, irregular sampling is becoming a necessity for reconstructing large and high-dimensional signals. However, the analysis of this type of data remains a challenge. One issue is the robust selection of neighborhoods − a crucial part of analytic tools such as topological decomposition, clustering and gradient estimation. When extracting the topology of sparsely sampled data, common neighborhood strategies such as k-nearest neighbors may lead to inaccurate results, either due to missing neighborhood connections, which introduce false extrema, or due to spurious connections, which conceal true extrema. Other neighborhoods, such as the Delaunay triangulation, are costly to compute and store even in relatively low dimensions. In this paper, we address these issues. We present two new types of neighborhood graphs: a variation on and a generalization of empty region graphs, which considerably improve the robustness of neighborhood-based analysis tools, such as topological decomposition. Our findings suggest that these neighborhood graphs lead to more accurate topological representations of low- and high- dimensional data sets at relatively low cost, both in terms of storage and computation time. We describe the implications of our work in the analysis and visualization of scalar functions, and provide general strategies for computing and applying our neighborhood graphs towards robust data analysis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Sparse, irregular sampling is becoming a necessity for reconstructing large and high-dimensional signals. However, the analysis of this type of data remains a challenge. One issue is the robust selection of neighborhoods − a crucial part of analytic tools such as topological decomposition, clustering and gradient estimation. When extracting the topology of sparsely sampled data, common neighborhood strategies such as k-nearest neighbors may lead to inaccurate results, either due to missing neighborhood connections, which introduce false extrema, or due to spurious connections, which conceal true extrema. Other neighborhoods, such as the Delaunay triangulation, are costly to compute and store even in relatively low dimensions. In this paper, we address these issues. We present two new types of neighborhood graphs: a variation on and a generalization of empty region graphs, which considerably improve the robustness of neighborhood-based analysis tools, such as topological decomposition. Our findings suggest that these neighborhood graphs lead to more accurate topological representations of low- and high- dimensional data sets at relatively low cost, both in terms of storage and computation time. We describe the implications of our work in the analysis and visualization of scalar functions, and provide general strategies for computing and applying our neighborhood graphs towards robust data analysis.", "title": "Towards Robust Topology of Sparsely Sampled Data", "normalizedTitle": "Towards Robust Topology of Sparsely Sampled Data", "fno": "ttg2011121852", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Neighborhood Graphs", "Topology", "Sparsely Sampled Data" ], "authors": [ { "givenName": "Carlos", "surname": "Correa", "fullName": "Carlos Correa", "affiliation": "Lawrence Livermore National Lab", "__typename": "ArticleAuthorType" }, { "givenName": "Peter", "surname": "Lindstrom", "fullName": "Peter Lindstrom", "affiliation": "Lawrence Livermore National Lab", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2011-12-01 00:00:00", "pubType": "trans", "pages": "1852-1861", "year": "2011", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/focs/1972/4847/0/484700040", "title": "SGML results in computational topology", "doi": null, "abstractUrl": "/proceedings-article/focs/1972/484700040/12OmNAtK4g0", "parentPublication": { "id": "proceedings/focs/1972/4847/0", "title": "13th Annual Symposium on Switching and Automata Theory (swat 1972)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/his/2009/3745/3/3745c370", "title": "On Some Properties of the lbest Topology in Particle Swarm Optimization", "doi": null, "abstractUrl": "/proceedings-article/his/2009/3745c370/12OmNBeRtOi", "parentPublication": { "id": "proceedings/his/2009/3745/3", "title": "Hybrid Intelligent Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipps/1991/9167/0/00153786", "title": "Analysis of neighborhood interaction in Kohonen neural networks", "doi": null, "abstractUrl": "/proceedings-article/ipps/1991/00153786/12OmNBgQFR2", "parentPublication": { "id": "proceedings/ipps/1991/9167/0", "title": "Parallel Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2009/3736/1/3736a299", "title": "Robust Locally Linear Embedding and Application in High Dimensional Data", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736a299/12OmNrH1PHF", "parentPublication": { "id": "proceedings/icnc/2009/3736/4", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csie/2009/3507/4/3507d831", "title": "A Parallel QPSO Algorithm Using Neighborhood Topology Model", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507d831/12OmNx4Q6Hk", "parentPublication": { "id": "proceedings/csie/2009/3507/4", "title": "Computer Science and Information Engineering, World Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/1997/06/00650138", "title": "A quantitative comparison of graph-based models for Internet topology", "doi": null, "abstractUrl": "/journal/nt/1997/06/00650138/13rRUxlgxQj", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011121842", "title": "Topological Spines: A Structure-preserving Visual Representation of Scalar Fields", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011121842/13rRUygT7mU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icctech/2022/9918/0/991800a025", "title": "Fusion of Dual Neighborhood Information of Knowledge Graph for Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icctech/2022/991800a025/1KYsX8nGI5W", "parentPublication": { "id": "proceedings/icctech/2022/9918/0", "title": "2022 International Conference on Computer Technologies (ICCTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2019/6934/0/08909425", "title": "Structural Graph Representations based on Multiscale Local Network Topologies", "doi": null, "abstractUrl": "/proceedings-article/wi/2019/08909425/1feboHBcOxG", "parentPublication": { "id": "proceedings/wi/2019/6934/0", "title": "2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222093", "title": "Localized Topological Simplification of Scalar Data", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222093/1nTrExzmT5e", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2011121842", "articleId": "13rRUygT7mU", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2011121862", "articleId": "13rRUxd2aYY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nWKGhzMhb2", "doi": "10.1109/TVCG.2020.3030363", "abstract": "Researchers in the field of connectomics are working to reconstruct a map of neural connections in the brain in order to understand at a fundamental level how the brain processes information. Constructing this wiring diagram is done by tracing neurons through high-resolution image stacks acquired with fluorescence microscopy imaging techniques. While a large number of automatic tracing algorithms have been proposed, these frequently rely on local features in the data and fail on noisy data or ambiguous cases, requiring time-consuming manual correction. As a result, manual and semi-automatic tracing methods remain the state-of-the-art for creating accurate neuron reconstructions. We propose a new semi-automatic method that uses topological features to guide users in tracing neurons and integrate this method within a virtual reality (VR) framework previously used for manual tracing. Our approach augments both visualization and interaction with topological elements, allowing rapid understanding and tracing of complex morphologies. In our pilot study, neuroscientists demonstrated a strong preference for using our tool over prior approaches, reported less fatigue during tracing, and commended the ability to better understand possible paths and alternatives. Quantitative evaluation of the traces reveals that users' tracing speed increased, while retaining similar accuracy compared to a fully manual approach.", "abstracts": [ { "abstractType": "Regular", "content": "Researchers in the field of connectomics are working to reconstruct a map of neural connections in the brain in order to understand at a fundamental level how the brain processes information. Constructing this wiring diagram is done by tracing neurons through high-resolution image stacks acquired with fluorescence microscopy imaging techniques. While a large number of automatic tracing algorithms have been proposed, these frequently rely on local features in the data and fail on noisy data or ambiguous cases, requiring time-consuming manual correction. As a result, manual and semi-automatic tracing methods remain the state-of-the-art for creating accurate neuron reconstructions. We propose a new semi-automatic method that uses topological features to guide users in tracing neurons and integrate this method within a virtual reality (VR) framework previously used for manual tracing. Our approach augments both visualization and interaction with topological elements, allowing rapid understanding and tracing of complex morphologies. In our pilot study, neuroscientists demonstrated a strong preference for using our tool over prior approaches, reported less fatigue during tracing, and commended the ability to better understand possible paths and alternatives. Quantitative evaluation of the traces reveals that users' tracing speed increased, while retaining similar accuracy compared to a fully manual approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Researchers in the field of connectomics are working to reconstruct a map of neural connections in the brain in order to understand at a fundamental level how the brain processes information. Constructing this wiring diagram is done by tracing neurons through high-resolution image stacks acquired with fluorescence microscopy imaging techniques. While a large number of automatic tracing algorithms have been proposed, these frequently rely on local features in the data and fail on noisy data or ambiguous cases, requiring time-consuming manual correction. As a result, manual and semi-automatic tracing methods remain the state-of-the-art for creating accurate neuron reconstructions. We propose a new semi-automatic method that uses topological features to guide users in tracing neurons and integrate this method within a virtual reality (VR) framework previously used for manual tracing. Our approach augments both visualization and interaction with topological elements, allowing rapid understanding and tracing of complex morphologies. In our pilot study, neuroscientists demonstrated a strong preference for using our tool over prior approaches, reported less fatigue during tracing, and commended the ability to better understand possible paths and alternatives. Quantitative evaluation of the traces reveals that users' tracing speed increased, while retaining similar accuracy compared to a fully manual approach.", "title": "Improving the Usability of Virtual Reality Neuron Tracing with Topological Elements", "normalizedTitle": "Improving the Usability of Virtual Reality Neuron Tracing with Topological Elements", "fno": "09226101", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Biomedical Optical Imaging", "Brain", "Cellular Biophysics", "Data Visualisation", "Fluorescence", "Image Reconstruction", "Medical Image Processing", "Neurophysiology", "Optical Microscopy", "Virtual Reality", "Virtual Reality Neuron Tracing", "Topological Elements", "Neural Connections", "Brain", "Wiring Diagram", "High Resolution Image Stacks", "Fluorescence Microscopy Imaging", "Automatic Tracing", "Neuron Reconstructions", "Semiautomatic Method", "Visualization", "Complex Morphologies", "Neurons", "Tools", "Manuals", "Image Reconstruction", "Three Dimensional Displays", "Data Visualization", "Virtual Reality", "Morse Smale Complex", "Semi Automatic Neuron Tracing" ], "authors": [ { "givenName": "Torin", "surname": "McDonald", "fullName": "Torin McDonald", "affiliation": "SCI Institute, University of Utah", "__typename": "ArticleAuthorType" }, { "givenName": "Will", "surname": "Usher", "fullName": "Will Usher", "affiliation": "SCI Institute, University of Utah", "__typename": "ArticleAuthorType" }, { "givenName": "Nate", "surname": "Morrical", "fullName": "Nate Morrical", "affiliation": "SCI Institute, University of Utah", "__typename": "ArticleAuthorType" }, { "givenName": "Attila", "surname": "Gyulassy", "fullName": "Attila Gyulassy", "affiliation": "SCI Institute, University of Utah", "__typename": "ArticleAuthorType" }, { "givenName": "Steve", "surname": "Petruzza", "fullName": "Steve Petruzza", "affiliation": "SCI Institute, University of Utah, Utah State University", "__typename": "ArticleAuthorType" }, { "givenName": "Frederick", "surname": "Federer", "fullName": "Frederick Federer", "affiliation": "Moran Eye Institute, University of Utah", "__typename": "ArticleAuthorType" }, { "givenName": "Alessandra", "surname": "Angelucci", "fullName": "Alessandra Angelucci", "affiliation": "Moran Eye Institute, University of Utah", "__typename": "ArticleAuthorType" }, { "givenName": "Valerio", "surname": "Pascucci", "fullName": "Valerio Pascucci", "affiliation": "SCI Institute, University of Utah", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "744-754", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2011/1799/0/06120467", "title": "3D Neuron Tip Detection in Volumetric Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120467/12OmNBK5m7q", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2016/9036/0/9036a130", "title": "Automatic Neuron Tracing Using a Locally Tunable Approach", "doi": null, "abstractUrl": "/proceedings-article/cbms/2016/9036a130/12OmNwdbV1n", "parentPublication": { "id": "proceedings/cbms/2016/9036/0", "title": "2016 IEEE 29th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034a126", "title": "Automatic 3D Single Neuron Reconstruction with Exhaustive Tracing", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034a126/12OmNyvY9sc", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017617", "title": "A Virtual Reality Visualization Tool for Neuron Tracing", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017617/13rRUwI5U2O", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2018/5488/0/08621212", "title": "Automatic 3D Neuron Tracing Based on Terminations Detection", "doi": null, "abstractUrl": "/proceedings-article/bibm/2018/08621212/17D45VVho2h", "parentPublication": { "id": "proceedings/bibm/2018/5488/0", "title": "2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600f776", "title": "PointNeuron: 3D Neuron Reconstruction via Geometry and Topology Learning of Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600f776/1KxUsxFsCfS", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2018/7975/0/08726820", "title": "Semi-Automatic Neuron Tracing in Electron Microscope Images: Preliminary Results", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2018/08726820/1axfqBgB2fu", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2018/7975/0", "title": "2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0/298000a289", "title": "Optimization Algorithms in Reconstructions of Neuron Morphology: An Overview", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2019/298000a289/1ehBI4wpbUc", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0", "title": "2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150739", "title": "A Topological Nomenclature for 3D Shape Analysis in Connectomics", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150739/1lPHt0H0q0E", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2021/0296/0/029600b085", "title": "An Empirical Assessment of Global COVID-19 Contact Tracing Applications", "doi": null, "abstractUrl": "/proceedings-article/icse/2021/029600b085/1sEXoYSv7ag", "parentPublication": { "id": "proceedings/icse/2021/0296/0/", "title": "2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09241732", "articleId": "1oijQyHFwVa", "__typename": "AdjacentArticleType" }, "next": { "fno": "09234473", "articleId": "1o6HDND936U", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qLehDdoXrq", "name": "ttg202102-09226101s1-supp1-3030363.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09226101s1-supp1-3030363.mp4", "extension": "mp4", "size": "60.8 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNzZ5oaw", "title": "Nov.-Dec.", "year": "2015", "issueNum": "06", "idPrefix": "cs", "pubType": "magazine", "volume": "17", "label": "Nov.-Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUy3xYb7", "doi": "10.1109/MCSE.2015.116", "abstract": "One of the most daunting challenges confronting computational biologists is a problem that simulation developers in all disciplines face: the design of simulation code that can be easily understood and modified despite the complexity of the systems being modeled. To meet this challenge, the authors apply the discrete event system specification (DEVS), a general modeling formalism invented for the formal description of a wide range of systems that vary in time. Using DEVS, developers can address the complexity of a biological model by subdividing it into a hierarchy of simpler submodels. Hierarchical design is a well-known strategy for software development in general. But the question remains, what type of decomposition should be used? The authors use the upper levels of a hierarchy to separate different functions or algorithms, and then dedicate lower levels to the partitioning of space. To illustrate the approach, they present a DEVS-based model that captures the 3D self-assembly of vesicle clusters and their role in the propagation of information between nerve cells.", "abstracts": [ { "abstractType": "Regular", "content": "One of the most daunting challenges confronting computational biologists is a problem that simulation developers in all disciplines face: the design of simulation code that can be easily understood and modified despite the complexity of the systems being modeled. To meet this challenge, the authors apply the discrete event system specification (DEVS), a general modeling formalism invented for the formal description of a wide range of systems that vary in time. Using DEVS, developers can address the complexity of a biological model by subdividing it into a hierarchy of simpler submodels. Hierarchical design is a well-known strategy for software development in general. But the question remains, what type of decomposition should be used? The authors use the upper levels of a hierarchy to separate different functions or algorithms, and then dedicate lower levels to the partitioning of space. To illustrate the approach, they present a DEVS-based model that captures the 3D self-assembly of vesicle clusters and their role in the propagation of information between nerve cells.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "One of the most daunting challenges confronting computational biologists is a problem that simulation developers in all disciplines face: the design of simulation code that can be easily understood and modified despite the complexity of the systems being modeled. To meet this challenge, the authors apply the discrete event system specification (DEVS), a general modeling formalism invented for the formal description of a wide range of systems that vary in time. Using DEVS, developers can address the complexity of a biological model by subdividing it into a hierarchy of simpler submodels. Hierarchical design is a well-known strategy for software development in general. But the question remains, what type of decomposition should be used? The authors use the upper levels of a hierarchy to separate different functions or algorithms, and then dedicate lower levels to the partitioning of space. To illustrate the approach, they present a DEVS-based model that captures the 3D self-assembly of vesicle clusters and their role in the propagation of information between nerve cells.", "title": "Designing Biological Simulation Models Using Formalism-Based Functional and Spatial Decompositions", "normalizedTitle": "Designing Biological Simulation Models Using Formalism-Based Functional and Spatial Decompositions", "fno": "mcs2015060072", "hasPdf": true, "idPrefix": "cs", "keywords": [ "Biological System Modeling", "Biomembranes", "Computational Modeling", "Mathematical Model", "Biological Systems", "Deformable Models", "Scientific Computing", "DEVS", "Cell DEVS", "Discrete Event Simulation", "Hierarchical Model Design", "Tethered Particle System", "Presynaptic Nerve Terminals", "Synaptic Vesicle" ], "authors": [ { "givenName": "Rhys", "surname": "Goldstein", "fullName": "Rhys Goldstein", "affiliation": "Autodesk Research", "__typename": "ArticleAuthorType" }, { "givenName": "Gabriel A.", "surname": "Wainer", "fullName": "Gabriel A. Wainer", "affiliation": "Carleton University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2015-11-01 00:00:00", "pubType": "mags", "pages": "72-82", "year": "2015", "issn": "1521-9615", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/wsc/1993/1381/0/00718101", "title": "Devs Formalism and Methodology: Unity of Conception/diversity of Application", "doi": null, "abstractUrl": "/proceedings-article/wsc/1993/00718101/12OmNAXxXkj", "parentPublication": { "id": "proceedings/wsc/1993/1381/0", "title": "Proceedings of 1993 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aihas/1994/6440/0/00390488", "title": "Abstract simulator for the parallel DEVS formalism", "doi": null, "abstractUrl": "/proceedings-article/aihas/1994/00390488/12OmNC3FGdn", "parentPublication": { "id": "proceedings/aihas/1994/6440/0", "title": "Fifth Annual Conference on AI, and Planning in High Autonomy Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/simultech/2014/060/0/07095054", "title": "Complementarity between simulation and formal verification transformation of PROMELA models into FDDEVS models: Application to a case study", "doi": null, "abstractUrl": "/proceedings-article/simultech/2014/07095054/12OmNwDj132", "parentPublication": { "id": "proceedings/simultech/2014/060/0", "title": "2014 International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2006/0500/0/04117689", "title": "Introducing Variable Ports and Multi-Couplings for Cell Biological Modeling in DEVS", "doi": null, "abstractUrl": "/proceedings-article/wsc/2006/04117689/12OmNwbLVlJ", "parentPublication": { "id": "proceedings/wsc/2006/0500/0", "title": "2006 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/simultech/2014/060/0/07095017", "title": "A survey of Model-Driven approaches applied to DEVS - a comparative study of metamodels and transformations", "doi": null, "abstractUrl": "/proceedings-article/simultech/2014/07095017/12OmNyYDDyF", "parentPublication": { "id": "proceedings/simultech/2014/060/0", "title": "2014 International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2017/03/mcs2017030068", "title": "Using the Parallel DEVS Protocol for General Robust Simulation with Near Optimal Performance", "doi": null, "abstractUrl": "/magazine/cs/2017/03/mcs2017030068/13rRUILLkzo", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019859", "title": "Instant Construction and Visualization of Crowded Biological Environments", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019859/13rRUwcAqqm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/springsim/2019/8388/0/08732910", "title": "A Cell-Devs Model for Logistic Urban Growth", "doi": null, "abstractUrl": "/proceedings-article/springsim/2019/08732910/1aIRSG2Ym6Q", "parentPublication": { "id": "proceedings/springsim/2019/8388/0", "title": "2019 Spring Simulation Conference (SpringSim)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/springsim/2019/8388/0/08732894", "title": "A Behavior Annex For AADL Using The DEVS Formalism", "doi": null, "abstractUrl": "/proceedings-article/springsim/2019/08732894/1aIRTTygXgQ", "parentPublication": { "id": "proceedings/springsim/2019/8388/0", "title": "2019 Spring Simulation Conference (SpringSim)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/06/09042267", "title": "Genome-Scale Identification, in Silico Characterization and Interaction Study Between Wheat SNARE and NPSN Gene Families Involved in Vesicular Transport", "doi": null, "abstractUrl": "/journal/tb/2021/06/09042267/1ikbVvqfYxa", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mcs2015060061", "articleId": "13rRUwkfAUz", "__typename": "AdjacentArticleType" }, "next": { "fno": "mcs2015060083", "articleId": "13rRUx0geDl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1zarv24nAkg", "title": "Nov.-Dec.", "year": "2021", "issueNum": "06", "idPrefix": "tb", "pubType": "journal", "volume": "18", "label": "Nov.-Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1hJKfx8AYgM", "doi": "10.1109/TCBB.2020.2975780", "abstract": "Small molecule(SM) drugs can affect the expression of miRNAs, which plays crucial roles in many important biological processes. The chemical structure and clinical information of small molecule can simultaneously incorporate information such as anatomical distribution, therapeutic effects and structural characteristics. It is necessary to develop a novel model that incorporates small molecule chemical structure and clinical information to reveal the unknown small molecule-miRNA associations. In this study, we developed a new framework based on non-negative matrix factorization, called SMANMF, to discover the potential small molecules-miRNAs associations. First, the functional similarity of two miRNAs can be obtained by computing the overlap of the target gene sets in which the miRNAs interact together, and we integrated two types of small molecule similarities, including chemical similarity and clinical similarity. Then, we utilized a non-negative matrix factorization model to discover the unknown relationship between small molecules and miRNAs. The evaluation results indicate that our model can achieve superior prediction performance compared with previous approaches in 5-fold cross-validation. At the same time, the results of case studies also reveal that the SMANMF model has good predictive performance for predicting the potential association between small molecules and miRNAs.", "abstracts": [ { "abstractType": "Regular", "content": "Small molecule(SM) drugs can affect the expression of miRNAs, which plays crucial roles in many important biological processes. The chemical structure and clinical information of small molecule can simultaneously incorporate information such as anatomical distribution, therapeutic effects and structural characteristics. It is necessary to develop a novel model that incorporates small molecule chemical structure and clinical information to reveal the unknown small molecule-miRNA associations. In this study, we developed a new framework based on non-negative matrix factorization, called SMANMF, to discover the potential small molecules-miRNAs associations. First, the functional similarity of two miRNAs can be obtained by computing the overlap of the target gene sets in which the miRNAs interact together, and we integrated two types of small molecule similarities, including chemical similarity and clinical similarity. Then, we utilized a non-negative matrix factorization model to discover the unknown relationship between small molecules and miRNAs. The evaluation results indicate that our model can achieve superior prediction performance compared with previous approaches in 5-fold cross-validation. At the same time, the results of case studies also reveal that the SMANMF model has good predictive performance for predicting the potential association between small molecules and miRNAs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Small molecule(SM) drugs can affect the expression of miRNAs, which plays crucial roles in many important biological processes. The chemical structure and clinical information of small molecule can simultaneously incorporate information such as anatomical distribution, therapeutic effects and structural characteristics. It is necessary to develop a novel model that incorporates small molecule chemical structure and clinical information to reveal the unknown small molecule-miRNA associations. In this study, we developed a new framework based on non-negative matrix factorization, called SMANMF, to discover the potential small molecules-miRNAs associations. First, the functional similarity of two miRNAs can be obtained by computing the overlap of the target gene sets in which the miRNAs interact together, and we integrated two types of small molecule similarities, including chemical similarity and clinical similarity. Then, we utilized a non-negative matrix factorization model to discover the unknown relationship between small molecules and miRNAs. The evaluation results indicate that our model can achieve superior prediction performance compared with previous approaches in 5-fold cross-validation. At the same time, the results of case studies also reveal that the SMANMF model has good predictive performance for predicting the potential association between small molecules and miRNAs.", "title": "Incorporating Clinical, Chemical and Biological Information for Predicting Small Molecule-microRNA Associations Based on Non-Negative Matrix Factorization", "normalizedTitle": "Incorporating Clinical, Chemical and Biological Information for Predicting Small Molecule-microRNA Associations Based on Non-Negative Matrix Factorization", "fno": "09007520", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Bioinformatics", "Genetics", "Genomics", "Matrix Decomposition", "Molecular Biophysics", "RNA", "Chemical Similarity", "Clinical Similarity", "Nonnegative Matrix Factorization", "Biological Information", "Biological Processes", "Clinical Information", "Molecule Chemical Structure", "Molecule Mi RNA Associations", "Small Molecule Micro RNA Association Prediction", "SMANMF", "Drugs", "Chemicals", "Predictive Models", "Computational Modeling", "Diseases", "Biological System Modeling", "Biological Processes", "Small Molecule Associated Mi RN As Prediction", "Clinical Similarity", "Chemical Similarity", "Non Negative Matrix Factorization" ], "authors": [ { "givenName": "Jiawei", "surname": "Luo", "fullName": "Jiawei Luo", "affiliation": "College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Cong", "surname": "Shen", "fullName": "Cong Shen", "affiliation": "College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zihan", "surname": "Lai", "fullName": "Zihan Lai", "affiliation": "College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jie", "surname": "Cai", "fullName": "Jie Cai", "affiliation": "College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Pingjian", "surname": "Ding", "fullName": "Pingjian Ding", "affiliation": "School of Computer Science, University of South China, Hengyang, Hunan, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2021-11-01 00:00:00", "pubType": "trans", "pages": "2535-2545", "year": "2021", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2016/1611/0/07822488", "title": "Predicting microRNA-environmental factor interactions based on bi-random walk and multi-label learning", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822488/12OmNxG1ySy", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999387", "title": "Scaffold-based chemical space exploration", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999387/12OmNyywxAA", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/06/07505911", "title": "Predicting MicroRNA-Disease Associations Based on Improved MicroRNA and Disease Similarities", "doi": null, "abstractUrl": "/journal/tb/2018/06/07505911/17D45X2fUER", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669692", "title": "Deep Latent-Variable Models for Controllable Molecule Generation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669692/1A9Vddc6bFS", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669794", "title": "MolCloze: A Unified Cloze-style Self-supervised Molecular Structure Learning Model for Chemical Property Prediction", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669794/1A9WgcnQoCs", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/06/09684701", "title": "Inferring Latent MicroRNA-Disease Associations on a Gene-Mediated Tripartite Heterogeneous Multiplexing Network", "doi": null, "abstractUrl": "/journal/tb/2022/06/09684701/1Agmkvp7QrK", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icinc/2022/0969/0/096900a116", "title": "Drug-target affinity prediction method based on consistent expression of heterogeneous data", "doi": null, "abstractUrl": "/proceedings-article/icinc/2022/096900a116/1M673uAUUcU", "parentPublication": { "id": "proceedings/icinc/2022/0969/0", "title": "2022 International Conference on Informatics, Networking and Computing (ICINC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2020/6034/0/603400a251", "title": "A Protein Embedding Model for Drug Molecular Screening", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2020/603400a251/1jdDwPZLRvO", "parentPublication": { "id": "proceedings/bigcomp/2020/6034/0", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/11/09330796", "title": "MOLER: Incorporate Molecule-Level Reward to Enhance Deep Generative Model for Molecule Optimization", "doi": null, "abstractUrl": "/journal/tk/2022/11/09330796/1qzsDggXIXu", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a492", "title": "Heterogeneous Molecular Graph Neural Networks for Predicting Molecule Properties", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a492/1r54AY2cp9K", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09040403", "articleId": "1iiwUubqDOE", "__typename": "AdjacentArticleType" }, "next": { "fno": "08994100", "articleId": "1hkQFHPK9y0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNy49sJl", "title": "Nov.", "year": "2013", "issueNum": "11", "idPrefix": "tg", "pubType": "journal", "volume": "19", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUIJuxpy", "doi": "10.1109/TVCG.2013.89", "abstract": "The Five Ws is a popular concept for information gathering in journalistic reporting. It captures all aspects of a story or incidence: who, when, what, where, and why. We propose a framework composed of a suite of cooperating visual information displays to represent the Five Ws and demonstrate its use within a healthcare informatics application. Here, the who is the patient, the where is the patient's body, and the when, what, why is a reasoning chain which can be interactively sorted and brushed. The patient is represented as a radial sunburst visualization integrated with a stylized body map. This display captures all health conditions of the past and present to serve as a quick overview to the interrogating physician. The reasoning chain is represented as a multistage flow chart, composed of date, symptom, data, diagnosis, treatment, and outcome. Our system seeks to improve the usability of information captured in the electronic medical record (EMR) and we show via multiple examples that our framework can significantly lower the time and effort needed to access the medical patient information required to arrive at a diagnostic conclusion.", "abstracts": [ { "abstractType": "Regular", "content": "The Five Ws is a popular concept for information gathering in journalistic reporting. It captures all aspects of a story or incidence: who, when, what, where, and why. We propose a framework composed of a suite of cooperating visual information displays to represent the Five Ws and demonstrate its use within a healthcare informatics application. Here, the who is the patient, the where is the patient's body, and the when, what, why is a reasoning chain which can be interactively sorted and brushed. The patient is represented as a radial sunburst visualization integrated with a stylized body map. This display captures all health conditions of the past and present to serve as a quick overview to the interrogating physician. The reasoning chain is represented as a multistage flow chart, composed of date, symptom, data, diagnosis, treatment, and outcome. Our system seeks to improve the usability of information captured in the electronic medical record (EMR) and we show via multiple examples that our framework can significantly lower the time and effort needed to access the medical patient information required to arrive at a diagnostic conclusion.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Five Ws is a popular concept for information gathering in journalistic reporting. It captures all aspects of a story or incidence: who, when, what, where, and why. We propose a framework composed of a suite of cooperating visual information displays to represent the Five Ws and demonstrate its use within a healthcare informatics application. Here, the who is the patient, the where is the patient's body, and the when, what, why is a reasoning chain which can be interactively sorted and brushed. The patient is represented as a radial sunburst visualization integrated with a stylized body map. This display captures all health conditions of the past and present to serve as a quick overview to the interrogating physician. The reasoning chain is represented as a multistage flow chart, composed of date, symptom, data, diagnosis, treatment, and outcome. Our system seeks to improve the usability of information captured in the electronic medical record (EMR) and we show via multiple examples that our framework can significantly lower the time and effort needed to access the medical patient information required to arrive at a diagnostic conclusion.", "title": "The Five Ws for Information Visualization with Application to Healthcare Informatics", "normalizedTitle": "The Five Ws for Information Visualization with Application to Healthcare Informatics", "fno": "ttg2013111895", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Medical Diagnostic Imaging", "Data Visualization", "Diseases", "Color", "Visualization", "History", "Electronic Health Record EHR", "Visual Knowledge Representation", "Data Fusion And Integration", "Coordinated And Multiple Views", "Focus And Context", "Health Informatics", "Electronic Medical Record EMR" ], "authors": [ { "givenName": null, "surname": "Zhiyuan Zhang", "fullName": "Zhiyuan Zhang", "affiliation": "Comput. Sci. Dept., Stony Brook Univ., Stony Brook, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": null, "surname": "Bing Wang", "fullName": "Bing Wang", "affiliation": "Comput. Sci. Dept., Stony Brook Univ., Stony Brook, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "F.", "surname": "Ahmed", "fullName": "F. Ahmed", "affiliation": "Comput. Sci. Dept., Stony Brook Univ., Stony Brook, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "I. V.", "surname": "Ramakrishnan", "fullName": "I. V. Ramakrishnan", "affiliation": "Comput. Sci. Dept., Stony Brook Univ., Stony Brook, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": null, "surname": "Rong Zhao", "fullName": "Rong Zhao", "affiliation": "Comput. Sci. Dept., Stony Brook Univ., Stony Brook, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "A.", "surname": "Viccellio", "fullName": "A. Viccellio", "affiliation": "Dept. of Emergency Med., Stony Brook Univ. Hosp., Stony Brook, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "K.", "surname": "Mueller", "fullName": "K. Mueller", "affiliation": "Comput. Sci. Dept., Stony Brook Univ., Stony Brook, NY, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2013-11-01 00:00:00", "pubType": "trans", "pages": "1895-1910", "year": "2013", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/sbec/2016/2132/0/07459050", "title": "Application of Analytics to Big Data in Healthcare", "doi": null, "abstractUrl": "/proceedings-article/sbec/2016/07459050/12OmNAT0mOH", "parentPublication": { "id": "proceedings/sbec/2016/2132/0", "title": "2016 32nd Southern Biomedical Engineering Conference (SBEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2017/0367/2/0367b107", "title": "Standardizing the Crowdsourcing of Healthcare Data Using Modular Ontologies", "doi": null, "abstractUrl": "/proceedings-article/compsac/2017/0367b107/12OmNvAAtmB", "parentPublication": { "id": "compsac/2017/0367/2", "title": "2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217761", "title": "Predicting hospital readmission from longitudinal healthcare data using graph pattern mining based temporal phenotypes", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217761/12OmNyQGSqP", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2016/03/mcg2016030090", "title": "Data-Driven Healthcare: Challenges and Opportunities for Interactive Visualization", "doi": null, "abstractUrl": "/magazine/cg/2016/03/mcg2016030090/13rRUxN5evL", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/services/2018/7374/0/737400a019", "title": "Similarity Matching for Workflows in Medical Domain Using Topic Modeling", "doi": null, "abstractUrl": "/proceedings-article/services/2018/737400a019/14Fq0ZnbzgC", "parentPublication": { "id": "proceedings/services/2018/7374/0", "title": "2018 IEEE World Congress on Services (SERVICES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aicis/2018/9188/0/918800a023", "title": "Facilitating Patient Registrations Using an Integrating Healthcare Management System", "doi": null, "abstractUrl": "/proceedings-article/aicis/2018/918800a023/17PYElVL3mI", "parentPublication": { "id": "proceedings/aicis/2018/9188/0", "title": "2018 1st Annual International Conference on Information and Sciences (AiCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300a194", "title": "Medical Dialogue Generation via Extracting Heterogenous Information", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300a194/1LSPJf2Zxe0", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a405", "title": "progViz: Visualizing Patient Journeys Based on Finite State Models", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a405/1cMFaiuWv2U", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006351", "title": "Visualization for Quality Healthcare: Patient Flow Exploration", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006351/1hJskMo9v9u", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2020/9429/0/942900a177", "title": "A Clustering Framework for Patient Phenotyping with Application to Adverse Drug Events", "doi": null, "abstractUrl": "/proceedings-article/cbms/2020/942900a177/1mLMis5V7m8", "parentPublication": { "id": "proceedings/cbms/2020/9429/0", "title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2013111885", "articleId": "13rRUyeCkaf", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2013111911", "articleId": "13rRUxAASVU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXWRLr", "name": "ttg2013111895s.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg2013111895s.mp4", "extension": "mp4", "size": "16.3 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1J4y5ChPA64", "title": "Nov.-Dec.", "year": "2022", "issueNum": "06", "idPrefix": "cg", "pubType": "magazine", "volume": "42", "label": "Nov.-Dec.", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1FWhZeTLmnu", "doi": "10.1109/MCG.2022.3197957", "abstract": "The process of finding a diagnosis in the medical domain relies on implicit knowledge and the experience of a human expert. In this article, we report on the observation of human decision making, shown by the example of pathology. By tracking the diagnostic steps, individual building blocks are identified, which not only contribute to a diagnostic finding, but can also be used in the future to train and develop artificial intelligence (AI) algorithms. This work also provides insights into the interaction of human experts regarding the observation time of so-called &#x201C;hot spots,&#x201D; the magnification used for specific findings, and the overall observation and decision path followed. The documentation scheme yields a standardized examination procedure that shows the concept the pathologist is actually looking for as well as the possible features of findings that can be identified. This contribution indicates how important visualization is for human-centered AI, and specifically for enabling human oversight with respect to AI implementation in high-stake areas, such as medicine.", "abstracts": [ { "abstractType": "Regular", "content": "The process of finding a diagnosis in the medical domain relies on implicit knowledge and the experience of a human expert. In this article, we report on the observation of human decision making, shown by the example of pathology. By tracking the diagnostic steps, individual building blocks are identified, which not only contribute to a diagnostic finding, but can also be used in the future to train and develop artificial intelligence (AI) algorithms. This work also provides insights into the interaction of human experts regarding the observation time of so-called &#x201C;hot spots,&#x201D; the magnification used for specific findings, and the overall observation and decision path followed. The documentation scheme yields a standardized examination procedure that shows the concept the pathologist is actually looking for as well as the possible features of findings that can be identified. This contribution indicates how important visualization is for human-centered AI, and specifically for enabling human oversight with respect to AI implementation in high-stake areas, such as medicine.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The process of finding a diagnosis in the medical domain relies on implicit knowledge and the experience of a human expert. In this article, we report on the observation of human decision making, shown by the example of pathology. By tracking the diagnostic steps, individual building blocks are identified, which not only contribute to a diagnostic finding, but can also be used in the future to train and develop artificial intelligence (AI) algorithms. This work also provides insights into the interaction of human experts regarding the observation time of so-called “hot spots,” the magnification used for specific findings, and the overall observation and decision path followed. The documentation scheme yields a standardized examination procedure that shows the concept the pathologist is actually looking for as well as the possible features of findings that can be identified. This contribution indicates how important visualization is for human-centered AI, and specifically for enabling human oversight with respect to AI implementation in high-stake areas, such as medicine.", "title": "Understanding and Explaining Diagnostic Paths: Toward Augmented Decision Making", "normalizedTitle": "Understanding and Explaining Diagnostic Paths: Toward Augmented Decision Making", "fno": "09861384", "hasPdf": true, "idPrefix": "cg", "keywords": [ "Artificial Intelligence", "Data Mining", "Data Visualisation", "Decision Making", "Knowledge Based Systems", "Medical Image Processing", "AI Implementation", "Artificial Intelligence Algorithms", "Decision Path", "Diagnostic Finding", "Diagnostic Steps", "Hot Spots", "Human Decision Making", "Human Expert", "Human Oversight", "Human Centered AI", "Implicit Knowledge", "Individual Building Blocks", "Medical Domain", "Observation Time", "Specific Findings", "Standardized Examination Procedure", "Toward Augmented Decision Making", "Artificial Intelligence", "Medical Diagnostic Imaging", "Microscopy", "Medical Services", "Histopathology", "Decision Making", "Visualization" ], "authors": [ { "givenName": "Markus", "surname": "Plass", "fullName": "Markus Plass", "affiliation": "Medical University of Graz, Graz, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Michaela", "surname": "Kargl", "fullName": "Michaela Kargl", "affiliation": "Medical University of Graz, Graz, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Patrick", "surname": "Nitsche", "fullName": "Patrick Nitsche", "affiliation": "Medical University of Graz, Graz, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Emilian", "surname": "Jungwirth", "fullName": "Emilian Jungwirth", "affiliation": "Medical University of Graz, Graz, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Andreas", "surname": "Holzinger", "fullName": "Andreas Holzinger", "affiliation": "Medical University of Graz, Graz, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Heimo", "surname": "Müller", "fullName": "Heimo Müller", "affiliation": "Medical University of Graz, Graz, Austria", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "06", "pubDate": "2022-11-01 00:00:00", "pubType": "mags", "pages": "47-57", "year": "2022", "issn": "0272-1716", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2015/9926/0/07363928", "title": "Granular formalization of medical diagnostic process", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363928/12OmNB8kHWq", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2018/6060/0/606001a322", "title": "Phenotyping Diagnosis: Identification of Diagnostic Paths", "doi": null, "abstractUrl": "/proceedings-article/cbms/2018/606001a322/12OmNBfIhb7", "parentPublication": { "id": "proceedings/cbms/2018/6060/0", "title": "2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scamc/1983/0503/0/00764817", "title": "Using experience to improve clinical decision making", "doi": null, "abstractUrl": "/proceedings-article/scamc/1983/00764817/12OmNzX6cgy", "parentPublication": { "id": "proceedings/scamc/1983/0503/0", "title": "1983 The Seventh Annual Symposium on Computer Applications in Medical Care", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ncis/2011/4355/2/4355b376", "title": "Internet Addiction Diagnostic Decision-Making Based on Attribute Reduction of Rough Set Theories", "doi": null, "abstractUrl": "/proceedings-article/ncis/2011/4355b376/12OmNzahbXP", "parentPublication": { "id": "proceedings/ncis/2011/4355/2", "title": "Network Computing and Information Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecbs/1988/4863/0/00005449", "title": "Diagnostic algorithms and clinical diagnostic thinking", "doi": null, "abstractUrl": "/proceedings-article/ecbs/1988/00005449/12OmNzdoMmx", "parentPublication": { "id": "proceedings/ecbs/1988/4863/0", "title": "Proceedings of the Symposium on the Engineering of Computer-Based Medical", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2018/03/mcg2018030073", "title": "Toward a Multimodal Diagnostic Exploratory Visualization of Focal Cortical Dysplasia", "doi": null, "abstractUrl": "/magazine/cg/2018/03/mcg2018030073/13rRUypGGdb", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iisa/2018/8161/0/08633671", "title": "Development of the Intellectual Decision-Making Support Method for Medical Diagnostics in Psychiatric Practice", "doi": null, "abstractUrl": "/proceedings-article/iisa/2018/08633671/17D45WIXbQP", "parentPublication": { "id": "proceedings/iisa/2018/8161/0", "title": "2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a392", "title": "Visualization of Histopathological Decision Making Using a Roadbook Metaphor", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a392/1cMF8urE6vS", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2019/2999/0/08969598", "title": "Towards a Deeper Understanding of How a Pathologist Makes a Diagnosis: Visualization of the Diagnostic Process in Histopathology", "doi": null, "abstractUrl": "/proceedings-article/iscc/2019/08969598/1h0JYs1wL0Q", "parentPublication": { "id": "proceedings/iscc/2019/2999/0", "title": "2019 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2021/08/09504493", "title": "Conversational Artificial Intelligence: Changing Tomorrow’s Health Care Today", "doi": null, "abstractUrl": "/magazine/co/2021/08/09504493/1vJVyjU38bK", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09984059", "articleId": "1J4y8TSLqr6", "__typename": "AdjacentArticleType" }, "next": { "fno": "09984070", "articleId": "1J4y6S2dCZG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvA1hrM", "title": "May/June", "year": "2007", "issueNum": "03", "idPrefix": "cg", "pubType": "magazine", "volume": "27", "label": "May/June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUNvyanr", "doi": "10.1109/MCG.2007.63", "abstract": "Scientists, engineers, and artists regularly use illustrations in design, training, and education to display conceptual information, describe problems, and solve those problems. Researchers have developed many advanced rendering techniques on desktop platforms to facilitate illustration generation, but adapting these techniques to mobile platforms has not been easy. We discuss how advanced illustrative rendering techniques, such as interactive cutaway views, ghosted views, silhouettes, and selective rendering, have been adapted to mobile devices. We also present MobileVis, our interactive, illustrative 3D graphics and text rendering system that lets users explore 3D models' interior structures, display parts annotations, and visualize instructions, such as assembly and disassembly procedures for mechanical models", "abstracts": [ { "abstractType": "Regular", "content": "Scientists, engineers, and artists regularly use illustrations in design, training, and education to display conceptual information, describe problems, and solve those problems. Researchers have developed many advanced rendering techniques on desktop platforms to facilitate illustration generation, but adapting these techniques to mobile platforms has not been easy. We discuss how advanced illustrative rendering techniques, such as interactive cutaway views, ghosted views, silhouettes, and selective rendering, have been adapted to mobile devices. We also present MobileVis, our interactive, illustrative 3D graphics and text rendering system that lets users explore 3D models' interior structures, display parts annotations, and visualize instructions, such as assembly and disassembly procedures for mechanical models", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Scientists, engineers, and artists regularly use illustrations in design, training, and education to display conceptual information, describe problems, and solve those problems. Researchers have developed many advanced rendering techniques on desktop platforms to facilitate illustration generation, but adapting these techniques to mobile platforms has not been easy. We discuss how advanced illustrative rendering techniques, such as interactive cutaway views, ghosted views, silhouettes, and selective rendering, have been adapted to mobile devices. We also present MobileVis, our interactive, illustrative 3D graphics and text rendering system that lets users explore 3D models' interior structures, display parts annotations, and visualize instructions, such as assembly and disassembly procedures for mechanical models", "title": "Interactive Illustrative Rendering on Mobile Devices", "normalizedTitle": "Interactive Illustrative Rendering on Mobile Devices", "fno": "mcg2007030048", "hasPdf": true, "idPrefix": "cg", "keywords": [ "Data Visualisation", "Interactive Systems", "Mobile Computing", "Rendering Computer Graphics", "Solid Modelling", "Structural Engineering Computing", "Interactive Illustrative Text Rendering System", "Mobile Devices", "Interactive Cutaway Views", "Ghosted Views", "Silhouettes", "Selective Rendering", "Mobile Vis System", "Interactive Illustrative 3 D Graphics System", "3 D Model Interior Structures", "Visualization", "Rendering Computer Graphics", "Graphics", "Three Dimensional Displays", "Laboratories", "Clocks", "Handheld Computers", "Java", "Research And Development", "Application Software", "Mobile Computing", "Mobile Devices", "Visualization", "Illustration", "CAD" ], "authors": [ { "givenName": "Jingshu", "surname": "Huang", "fullName": "Jingshu Huang", "affiliation": "Purdue University", "__typename": "ArticleAuthorType" }, { "givenName": "Brian", "surname": "Bue", "fullName": "Brian Bue", "affiliation": "Purdue University", "__typename": "ArticleAuthorType" }, { "givenName": "Avin", "surname": "Pattath", "fullName": "Avin Pattath", "affiliation": "Purdue University", "__typename": "ArticleAuthorType" }, { "givenName": "David S.", "surname": "Ebert", "fullName": "David S. Ebert", "affiliation": "Purdue University", "__typename": "ArticleAuthorType" }, { "givenName": "Krystal M.", "surname": "Thomas", "fullName": "Krystal M. Thomas", "affiliation": "US Air Force Research Laboratory Wright-Patterson AFB", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2007-05-01 00:00:00", "pubType": "mags", "pages": "48-56", "year": "2007", "issn": "0272-1716", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2005/2766/0/01532863", "title": "Illustrative rendering techniques for visualization: Future of visualization or just another technique?", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/01532863/12OmNBKmXnI", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/01532855", "title": "Illustrative display of hidden iso-surface structures", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/01532855/12OmNBRsVxy", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2010/8420/0/05720357", "title": "Importance-Aware Composition for Illustrative Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2010/05720357/12OmNz5apMR", "parentPublication": { "id": "proceedings/sibgrapi/2010/8420/0", "title": "2010 23rd SIBGRAPI Conference on Graphics, Patterns and Images", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/1/3118a341", "title": "Perception-aware Depth Cueing for Illustrative Vascular Visualization", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118a341/12OmNzvhvKm", "parentPublication": { "id": "proceedings/bmei/2008/3118/1", "title": "2008 International Conference on Biomedical Engineering and Informatics (BMEI 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009061299", "title": "Depth-Dependent Halos: Illustrative Rendering of Dense Line Data", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009061299/13rRUEgs2LX", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2003/02/v0127", "title": "Illustrative Interactive Stipple Rendering", "doi": null, "abstractUrl": "/journal/tg/2003/02/v0127/13rRUIIVlcA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/04/ttg2010040571", "title": "Illustrative Volume Visualization Using GPU-Based Particle Systems", "doi": null, "abstractUrl": "/journal/tg/2010/04/ttg2010040571/13rRUwgyOjh", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/03/ttg2008030576", "title": "Interactive View-Dependent Rendering over Networks", "doi": null, "abstractUrl": "/journal/tg/2008/03/ttg2008030576/13rRUxC0SOT", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061329", "title": "Illustrative Stream Surfaces", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061329/13rRUxcsYLM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1336", "title": "Semantic Layers for Illustrative Volume Rendering", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1336/13rRUytWF9e", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mcg2007030032", "articleId": "13rRUxC0SGv", "__typename": "AdjacentArticleType" }, "next": { "fno": "mcg2007030070", "articleId": "13rRUynZ5qg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvsDHDY", "title": "Jan.", "year": "2020", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "26", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1cG4q4sh1bq", "doi": "10.1109/TVCG.2019.2934338", "abstract": "High-order finite element methods (HO-FEM) are gaining popularity in the simulation community due to their success in solving complex flow dynamics. There is an increasing need to analyze the data produced as output by these simulations. Simultaneously, topological analysis tools are emerging as powerful methods for investigating simulation data. However, most of the current approaches to topological analysis have had limited application to HO-FEM simulation data for two reasons. First, the current topological tools are designed for linear data (polynomial degree one), but the polynomial degree of the data output by these simulations is typically higher (routinely up to polynomial degree six). Second, the simulation data and derived quantities of the simulation data have discontinuities at element boundaries, and these discontinuities do not match the input requirements for the topological tools. One solution to both issues is to transform the high-order data to achieve low-order, continuous inputs for topological analysis. Nevertheless, there has been little work evaluating the possible transformation choices and their downstream effect on the topological analysis. We perform an empirical study to evaluate two commonly used data transformation methodologies along with the recently introduced L-SIAC filter for processing high-order simulation data. Our results show diverse behaviors are possible. We offer some guidance about how best to consider a pipeline of topological analysis of HO-FEM simulations with the currently available implementations of topological analysis.", "abstracts": [ { "abstractType": "Regular", "content": "High-order finite element methods (HO-FEM) are gaining popularity in the simulation community due to their success in solving complex flow dynamics. There is an increasing need to analyze the data produced as output by these simulations. Simultaneously, topological analysis tools are emerging as powerful methods for investigating simulation data. However, most of the current approaches to topological analysis have had limited application to HO-FEM simulation data for two reasons. First, the current topological tools are designed for linear data (polynomial degree one), but the polynomial degree of the data output by these simulations is typically higher (routinely up to polynomial degree six). Second, the simulation data and derived quantities of the simulation data have discontinuities at element boundaries, and these discontinuities do not match the input requirements for the topological tools. One solution to both issues is to transform the high-order data to achieve low-order, continuous inputs for topological analysis. Nevertheless, there has been little work evaluating the possible transformation choices and their downstream effect on the topological analysis. We perform an empirical study to evaluate two commonly used data transformation methodologies along with the recently introduced L-SIAC filter for processing high-order simulation data. Our results show diverse behaviors are possible. We offer some guidance about how best to consider a pipeline of topological analysis of HO-FEM simulations with the currently available implementations of topological analysis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "High-order finite element methods (HO-FEM) are gaining popularity in the simulation community due to their success in solving complex flow dynamics. There is an increasing need to analyze the data produced as output by these simulations. Simultaneously, topological analysis tools are emerging as powerful methods for investigating simulation data. However, most of the current approaches to topological analysis have had limited application to HO-FEM simulation data for two reasons. First, the current topological tools are designed for linear data (polynomial degree one), but the polynomial degree of the data output by these simulations is typically higher (routinely up to polynomial degree six). Second, the simulation data and derived quantities of the simulation data have discontinuities at element boundaries, and these discontinuities do not match the input requirements for the topological tools. One solution to both issues is to transform the high-order data to achieve low-order, continuous inputs for topological analysis. Nevertheless, there has been little work evaluating the possible transformation choices and their downstream effect on the topological analysis. We perform an empirical study to evaluate two commonly used data transformation methodologies along with the recently introduced L-SIAC filter for processing high-order simulation data. Our results show diverse behaviors are possible. We offer some guidance about how best to consider a pipeline of topological analysis of HO-FEM simulations with the currently available implementations of topological analysis.", "title": "The Effect of Data Transformations on Scalar Field Topological Analysis of High-Order FEM Solutions", "normalizedTitle": "The Effect of Data Transformations on Scalar Field Topological Analysis of High-Order FEM Solutions", "fno": "08805451", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Finite Element Analysis", "Flow", "Polynomials", "Topology", "L SIAC Filter", "Complex Flow Dynamics", "HO FEM Simulations", "High Order Simulation Data", "Data Output", "Polynomial Degree", "Linear Data", "Current Topological Tools", "HO FEM Simulation Data", "Topological Analysis Tools", "Simulation Community", "High Order Finite Element Methods", "High Order FEM Solutions", "Scalar Field Topological Analysis", "Data Transformations", "Data Models", "Finite Element Analysis", "Tools", "Data Visualization", "Level Set", "Analytical Models", "Transforms", "High Order Finite Element Methods", "Filtering Techniques", "Scalar Field Visualization", "Topological Analysis" ], "authors": [ { "givenName": "Ashok", "surname": "Jallepalli", "fullName": "Ashok Jallepalli", "affiliation": "SCI Institute, University of Utah", "__typename": "ArticleAuthorType" }, { "givenName": "Joshua A.", "surname": "Levine", "fullName": "Joshua A. Levine", "affiliation": "Department of Computer ScienceUniversity of Arizona", "__typename": "ArticleAuthorType" }, { "givenName": "Robert M.", "surname": "Kirby", "fullName": "Robert M. Kirby", "affiliation": "SCI Institute, University of Utah", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2020-01-01 00:00:00", "pubType": "trans", "pages": "162-172", "year": "2020", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/imccc/2011/4519/0/4519a615", "title": "The Principle of Reluctance Resolver and EMF Waveform Optimization Based on FEM", "doi": null, "abstractUrl": "/proceedings-article/imccc/2011/4519a615/12OmNBInLjB", "parentPublication": { "id": "proceedings/imccc/2011/4519/0", "title": "Instrumentation, Measurement, Computer, Communication and Control, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/2002/2402/0/24020771", "title": "Combined BEM/FEM Substrate Resistance Modeling", "doi": null, "abstractUrl": "/proceedings-article/dac/2002/24020771/12OmNBt3qmg", "parentPublication": { "id": "proceedings/dac/2002/2402/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcse/2010/4303/2/4303b325", "title": "A Combined Finite-Element and Finite-Volume Method in Reservoir Simulation", "doi": null, "abstractUrl": "/proceedings-article/wcse/2010/4303b325/12OmNCb3ftt", "parentPublication": { "id": "proceedings/wcse/2010/4303/2", "title": "2010 Second World Congress on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/2002/7607/0/01167507", "title": "Theoretical and practical validation of combined BEM/FEM substrate resistance modeling", "doi": null, "abstractUrl": "/proceedings-article/iccad/2002/01167507/12OmNsdo6px", "parentPublication": { "id": "proceedings/iccad/2002/7607/0", "title": "2002 IEEE/ACM International Conference on Computer Aided Design (ICCAD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicse/2015/0454/0/0454a079", "title": "Review of Analytical Modeling and Computational Solutions for Thermo-electrostatics Effects of Slender Bodies", "doi": null, "abstractUrl": "/proceedings-article/icicse/2015/0454a079/12OmNvlPkFo", "parentPublication": { "id": "proceedings/icicse/2015/0454/0", "title": "2015 Eighth International Conference on Internet Computing for Science and Engineering (ICICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicci/2010/4014/0/4014a436", "title": "Simulation for Cutting Deformable Model Based on X-FEM", "doi": null, "abstractUrl": "/proceedings-article/icicci/2010/4014a436/12OmNxjBfjY", "parentPublication": { "id": "proceedings/icicci/2010/4014/0", "title": "Intelligent Computing and Cognitive Informatics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2009/3562/0/3562a299", "title": "Application Research on MTC Technology in Casting Based on FEM Simulation", "doi": null, "abstractUrl": "/proceedings-article/iccms/2009/3562a299/12OmNyshmJ6", "parentPublication": { "id": "proceedings/iccms/2009/3562/0", "title": "2009 International Conference on Computer Modeling and Simulation. ICCMS 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2006/2751/0/04041273", "title": "GSGCP-FEM: A General Service-Oriented Grid Computing Platform for FEM-Based Simulations", "doi": null, "abstractUrl": "/proceedings-article/apscc/2006/04041273/12OmNzVoBKW", "parentPublication": { "id": "proceedings/apscc/2006/2751/0", "title": "2006 IEEE Asia-Pacific Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017592", "title": "On the Treatment of Field Quantities and Elemental Continuity in FEM Solutions", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017592/13rRUxBa5s4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933623", "title": "Point Movement in a DSL for Higher-Order FEM Visualization", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933623/1fTgIlL5vdS", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08794517", "articleId": "1cr2YZjGkPm", "__typename": "AdjacentArticleType" }, "next": { "fno": "08794560", "articleId": "1eX8ARELiX6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzsJ7l9", "title": "July", "year": "2016", "issueNum": "07", "idPrefix": "co", "pubType": "magazine", "volume": "49", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxNmPMt", "doi": "10.1109/MC.2016.200", "abstract": "Human-centered methods can help researchers better understand and meet programmers' needs. Because programming is a human activity, many of these methods can be used without change. However, some programmer needs require new methods, which can also be applied to domains other than software engineering. This article features five Web extras. The video at https://youtu.be/4PH9-qi-yTQ demonstrates Azurite, an Eclipse plug-in with a selective undo feature that lets programmers more easily backtrack their code. The video at https://youtu.be/gOSlR62-rd8 describes Graphite, an Eclipse plug-in offering active code completion, a simple but powerful technique that integrates useful code-generation tools directly into the editor. The video at https://youtu.be/zyrqcYxqDtI describes HANDS, a new programming system that emphasizes usability by building on children's and beginning programmers' natural problem-solving tendencies. The video extra at https://youtu.be/80EctbI7PFc describes Whyline, a debugging tool that lets developers ask questions about their program's output and behavior. The video at https://youtu.be/3L4MK2dG_6k demonstrates the prototype for Whyline, a debugging tool that lets developers pose questions about their program's output.", "abstracts": [ { "abstractType": "Regular", "content": "Human-centered methods can help researchers better understand and meet programmers' needs. Because programming is a human activity, many of these methods can be used without change. However, some programmer needs require new methods, which can also be applied to domains other than software engineering. This article features five Web extras. The video at https://youtu.be/4PH9-qi-yTQ demonstrates Azurite, an Eclipse plug-in with a selective undo feature that lets programmers more easily backtrack their code. The video at https://youtu.be/gOSlR62-rd8 describes Graphite, an Eclipse plug-in offering active code completion, a simple but powerful technique that integrates useful code-generation tools directly into the editor. The video at https://youtu.be/zyrqcYxqDtI describes HANDS, a new programming system that emphasizes usability by building on children's and beginning programmers' natural problem-solving tendencies. The video extra at https://youtu.be/80EctbI7PFc describes Whyline, a debugging tool that lets developers ask questions about their program's output and behavior. The video at https://youtu.be/3L4MK2dG_6k demonstrates the prototype for Whyline, a debugging tool that lets developers pose questions about their program's output.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Human-centered methods can help researchers better understand and meet programmers' needs. Because programming is a human activity, many of these methods can be used without change. However, some programmer needs require new methods, which can also be applied to domains other than software engineering. This article features five Web extras. The video at https://youtu.be/4PH9-qi-yTQ demonstrates Azurite, an Eclipse plug-in with a selective undo feature that lets programmers more easily backtrack their code. The video at https://youtu.be/gOSlR62-rd8 describes Graphite, an Eclipse plug-in offering active code completion, a simple but powerful technique that integrates useful code-generation tools directly into the editor. The video at https://youtu.be/zyrqcYxqDtI describes HANDS, a new programming system that emphasizes usability by building on children's and beginning programmers' natural problem-solving tendencies. The video extra at https://youtu.be/80EctbI7PFc describes Whyline, a debugging tool that lets developers ask questions about their program's output and behavior. The video at https://youtu.be/3L4MK2dG_6k demonstrates the prototype for Whyline, a debugging tool that lets developers pose questions about their program's output.", "title": "Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools", "normalizedTitle": "Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools", "fno": "mco2016070044", "hasPdf": true, "idPrefix": "co", "keywords": [ "Java", "Program Debugging", "Software Tools", "User Centred Design", "Human Centered Methods", "Programming Tools", "Human Activity", "Software Engineering", "Azurite", "Eclipse Plug In", "Undo Feature", "Graphite", "Active Code Completion", "HANDS", "Natural Problem Solving Tendencies", "Whyline", "Debugging Tool", "Human Computer Interaction", "Software Engineering", "Programming", "Human Computer Interaction", "Human Centered Computing", "Data Mining", "Natural Language Processing", "Software Engineering", "Software Psychology", "Studies Of Program Constructs", "Evaluation Studies", "Software Development", "End User Software Engineering", "Human Computer Interaction", "HCI", "Human Centered Computing", "User Interfaces", "Contextual Inquiry", "Exploratory Lab Studies", "Natural Programming Elicitation", "Rapid Prototyping", "Data Mining", "Log Analysis", "Think Aloud Usability Evaluation", "A B Testing" ], "authors": [ { "givenName": "Brad A.", "surname": "Myers", "fullName": "Brad A. Myers", "affiliation": "Carnegie Mellon University", "__typename": "ArticleAuthorType" }, { "givenName": "Amy J.", "surname": "Ko", "fullName": "Amy J. Ko", "affiliation": "University of Washington", "__typename": "ArticleAuthorType" }, { "givenName": "Thomas D.", "surname": "LaToza", "fullName": "Thomas D. LaToza", "affiliation": "George Mason University", "__typename": "ArticleAuthorType" }, { "givenName": "YoungSeok", "surname": "Yoon", "fullName": "YoungSeok Yoon", "affiliation": "Google", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2016-07-01 00:00:00", "pubType": "mags", "pages": "44-52", "year": "2016", "issn": "0018-9162", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/sc/1994/6605/0/00344272", "title": "Are expectations for parallelism too high? a survey of potential parallel users", "doi": null, "abstractUrl": "/proceedings-article/sc/1994/00344272/12OmNAolGPT", "parentPublication": { "id": "proceedings/sc/1994/6605/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/achi/2010/3957/0/3957a185", "title": "Training Undergraduate Students in User-Centered Design", "doi": null, "abstractUrl": "/proceedings-article/achi/2010/3957a185/12OmNvDqsKO", "parentPublication": { "id": "proceedings/achi/2010/3957/0", "title": "International Conference on Advances in Computer-Human Interaction", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wapi/2017/2805/0/07965483", "title": "Human-Centered Methods for Improving API Usability", "doi": null, "abstractUrl": "/proceedings-article/wapi/2017/07965483/12OmNy5hRfK", "parentPublication": { "id": "proceedings/wapi/2017/2805/0", "title": "2017 IEEE/ACM 1st International Workshop on API Usage and Evolution (WAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2009/08/mco2009080109", "title": "Natural and Implicit Interaction Systems", "doi": null, "abstractUrl": "/magazine/co/2009/08/mco2009080109/13rRUwcAqvj", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2017/05/mco2017050018", "title": "BlockPy: An Open Access Data-Science Environment for Introductory Programmers", "doi": null, "abstractUrl": "/magazine/co/2017/05/mco2017050018/13rRUxN5ezu", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2015/03/mit2015030060", "title": "Internet of Things Perspectives", "doi": null, "abstractUrl": "/magazine/it/2015/03/mit2015030060/13rRUxYIMRq", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2016/05/msp2016050073", "title": "Genteel Wearables: Bystander-Centered Design", "doi": null, "abstractUrl": "/magazine/sp/2016/05/msp2016050073/13rRUxYrbSV", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103470", "title": "Metacommunication between programmers through an application programming interface: A semiotic analysis of date and time APIs", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103470/17D45WZZ7CM", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2022/9598/0/959800a041", "title": "COSPEX: A Program Comprehension Tool for Novice Programmers", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2022/959800a041/1EaP68o0IjS", "parentPublication": { "id": "proceedings/icse-companion/2022/9598/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2022/4214/0/09833098", "title": "Accessibility of UI Frameworks and Libraries for Programmers with Visual Impairments", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2022/09833098/1FUSMSIi520", "parentPublication": { "id": "proceedings/vl-hcc/2022/4214/0", "title": "2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mco2016070034", "articleId": "13rRUxC0SzF", "__typename": "AdjacentArticleType" }, "next": { "fno": "mco2016070053", "articleId": "13rRUNvgzdP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXWRQ4", "name": "mco2016070044s4.mp3", "location": "https://www.computer.org/csdl/api/v1/extra/mco2016070044s4.mp3", "extension": "mp3", "size": "6.46 MB", "__typename": "WebExtraType" }, { "id": "17ShDTXWRQ1", "name": "mco2016070044s5.mp3", "location": "https://www.computer.org/csdl/api/v1/extra/mco2016070044s5.mp3", "extension": "mp3", "size": "1.54 MB", "__typename": "WebExtraType" }, { "id": "17ShDTXWRQ3", "name": "mco2016070044s1.mp3", "location": "https://www.computer.org/csdl/api/v1/extra/mco2016070044s1.mp3", "extension": "mp3", "size": "3.61 MB", "__typename": "WebExtraType" }, { "id": "17ShDTXWRQ5", "name": "mco2016070044s2.mp3", "location": "https://www.computer.org/csdl/api/v1/extra/mco2016070044s2.mp3", "extension": "mp3", "size": "9.99 MB", "__typename": "WebExtraType" }, { "id": "17ShDTXWRQ2", "name": "mco2016070044s3.mp3", "location": "https://www.computer.org/csdl/api/v1/extra/mco2016070044s3.mp3", "extension": "mp3", "size": "7.3 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNzzxux6", "title": "Dec.", "year": "2014", "issueNum": "12", "idPrefix": "co", "pubType": "magazine", "volume": "47", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyYBlbY", "doi": "10.1109/MC.2014.355", "abstract": "Integration of human-centered design in a company's software development practice requires a thorough analysis of its current practices by both researchers and practitioners.", "abstracts": [ { "abstractType": "Regular", "content": "Integration of human-centered design in a company's software development practice requires a thorough analysis of its current practices by both researchers and practitioners.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Integration of human-centered design in a company's software development practice requires a thorough analysis of its current practices by both researchers and practitioners.", "title": "Human-Centered Design in Industry: Lessons from the Trenches", "normalizedTitle": "Human-Centered Design in Industry: Lessons from the Trenches", "fno": "mco2014120086", "hasPdf": true, "idPrefix": "co", "keywords": [ "Software Engineering", "User Centred Design", "Human Centered Design", "Company Software Development Practice", "Thorough Analysis", "User Centered Design", "Design Methodolgy", "Software Development", "Human Computer Interaction", "Cooperative Systems", "Prototypes", "Software Technologies", "Software Development", "Usability", "User Experience", "Human Centered Design", "Action Research", "Cooperative Method Development" ], "authors": [ { "givenName": "Carmelo", "surname": "Ardito", "fullName": "Carmelo Ardito", "affiliation": "University of Bari Aldo Moro", "__typename": "ArticleAuthorType" }, { "givenName": "Paolo", "surname": "Buono", "fullName": "Paolo Buono", "affiliation": "University of Bari Aldo Moro", "__typename": "ArticleAuthorType" }, { "givenName": "Danilo", "surname": "Caivano", "fullName": "Danilo Caivano", "affiliation": "University of Bari Aldo Moro", "__typename": "ArticleAuthorType" }, { "givenName": "Maria Francesca", "surname": "Costabile", "fullName": "Maria Francesca Costabile", "affiliation": "University of Bari Aldo Moro", "__typename": "ArticleAuthorType" }, { "givenName": "Rosa", "surname": "Lanzilotti", "fullName": "Rosa Lanzilotti", "affiliation": "University of Bari Aldo Moro", "__typename": "ArticleAuthorType" }, { "givenName": "Yvonne", "surname": "Dittrich", "fullName": "Yvonne Dittrich", "affiliation": "IT University of Copenhagen", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2014-12-01 00:00:00", "pubType": "mags", "pages": "86-89", "year": "2014", "issn": "0018-9162", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/wism/2009/3817/0/3817a589", "title": "Citizen-Centered E-Government Strategy Governance Framework: Case of China", "doi": null, "abstractUrl": "/proceedings-article/wism/2009/3817a589/12OmNBscCWZ", "parentPublication": { "id": "proceedings/wism/2009/3817/0", "title": "Web Information Systems and Mining, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2010/6261/0/05673194", "title": "Work in progress -- Phenomenographic approach to understanding students' ways of experiencing human-centered design", "doi": null, "abstractUrl": "/proceedings-article/fie/2010/05673194/12OmNC943KA", "parentPublication": { "id": "proceedings/fie/2010/6261/0", "title": "2010 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2011/0445/0/04451132", "title": "A framework for the integration of user centered design and agile software development processes", "doi": null, "abstractUrl": "/proceedings-article/icse/2011/04451132/12OmNx4yvrl", "parentPublication": { "id": "proceedings/icse/2011/0445/0", "title": "2011 33rd International Conference on Software Engineering (ICSE 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hics/1998/8341/0/83410004", "title": "An Eclectic Approach to Complexity from a Human-Centered Perspective", "doi": null, "abstractUrl": "/proceedings-article/hics/1998/83410004/12OmNxEBzkh", "parentPublication": { "id": "proceedings/hics/1998/8341/0", "title": "Human Interaction with Complex Systems, Annual Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2010/6261/0/05673150", "title": "Work in progress -- Development of a design task to assess students' understanding of human-centered design", "doi": null, "abstractUrl": "/proceedings-article/fie/2010/05673150/12OmNzSh12d", "parentPublication": { "id": "proceedings/fie/2010/6261/0", "title": "2010 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2016/07/mco2016070044", "title": "Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools", "doi": null, "abstractUrl": "/magazine/co/2016/07/mco2016070044/13rRUxNmPMt", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2008/02/mco2008020042", "title": "EventWeb: Developing a Human-Centered Computing System", "doi": null, "abstractUrl": "/magazine/co/2008/02/mco2008020042/13rRUxOvedg", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2007/05/r5030", "title": "Guest Editors' Introduction: Human-Centered Computing--Toward a Human Revolution", "doi": null, "abstractUrl": "/magazine/co/2007/05/r5030/13rRUxjQykH", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2005/02/x2073", "title": "Work-Centered Support Systems: A Human-Centered Approach to Intelligent System Design", "doi": null, "abstractUrl": "/magazine/ex/2005/02/x2073/13rRUyekJ1X", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mco2014120082", "articleId": "13rRUwh80y0", "__typename": "AdjacentArticleType" }, "next": { "fno": "mco2014120090", "articleId": "13rRUxYIMYR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }